Architectural Support for Copy and Tamper Resistant Software D Lie, C Thekkath, P Lincoln, M Mitchell, D Boneh, J Mitchell, M Horowitz ACM SIGOPS Operating Systems Review 34 (5), 168--177, 2000 | 1069 | 2000 |
Pscout: analyzing the android permission specification KWY Au, YF Zhou, Z Huang, D Lie Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1049 | 2012 |
Machine unlearning L Bourtoule, V Chandrasekaran, CA Choquette-Choo, H Jia, A Travers, ... 2021 IEEE Symposium on Security and Privacy (SP), 141-159, 2021 | 609 | 2021 |
Prochlo: Strong privacy for analytics in the crowd A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ... Proceedings of the 26th symposium on operating systems principles, 441-459, 2017 | 479 | 2017 |
Hypervisor Support for Identifying Covertly Executing Binaries. L Litty, HA Lagar-Cavilla, D Lie USENIX Security Symposium 22, 70, 2008 | 320 | 2008 |
Implementing an untrusted operating system on trusted hardware D Lie, CA Thekkath, M Horowitz Proceedings of the nineteenth ACM symposium on Operating systems principles …, 2003 | 304 | 2003 |
Intellidroid: a targeted input generator for the dynamic analysis of android malware. MY Wong, D Lie NDSS 16 (2016), 21-24, 2016 | 302 | 2016 |
Splitting interfaces: Making trust between applications and operating systems configurable R Ta-Min, L Litty, D Lie Proceedings of the 7th symposium on Operating systems design and …, 2006 | 277 | 2006 |
Specifying and verifying hardware for tamper-resistant software D Lie, J Mitchell, CA Thekkath, M Horowitz 2003 Symposium on Security and Privacy, 2003., 166-177, 2003 | 155 | 2003 |
The state of public infrastructure-as-a-service cloud security W Huang, A Ganjali, BH Kim, S Oh, D Lie ACM Computing Surveys (CSUR) 47 (4), 1-31, 2015 | 111 | 2015 |
A buffer overflow benchmark for software model checkers K Ku, TE Hart, M Chechik, D Lie Proceedings of the 22nd IEEE/ACM International Conference on Automated …, 2007 | 111 | 2007 |
Short paper: a look at smartphone permission models KWY Au, YF Zhou, Z Huang, P Gill, D Lie Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 108 | 2011 |
Dude, Where's That {IP}? Circumventing Measurement-based {IP} Geolocation P Gill, Y Ganjali, B Wong 19th USENIX Security Symposium (USENIX Security 10), 2010 | 103 | 2010 |
Manitou: a layer-below approach to fighting malware L Litty, D Lie Proceedings of the 1st workshop on Architectural and system support for …, 2006 | 96 | 2006 |
Susceptibility of commodity systems and software to memory soft errors A Messer, P Bernadat, G Fu, D Chen, Z Dimitrijevic, D Lie, DD Mannaru, ... IEEE transactions on Computers 53 (12), 1557-1568, 2004 | 90 | 2004 |
Kivati: fast detection and prevention of atomicity violations L Chew, D Lie Proceedings of the 5th European conference on Computer systems, 307-320, 2010 | 89 | 2010 |
Using VMM-based sensors to monitor honeypots K Asrigo, L Litty, D Lie Proceedings of the 2nd international conference on Virtual execution …, 2006 | 88 | 2006 |
Using safety properties to generate vulnerability patches Z Huang, D Lie, G Tan, T Jaeger 2019 IEEE symposium on security and privacy (SP), 539-554, 2019 | 82 | 2019 |
Openflow timeouts demystified A Zarek, Y Ganjali, D Lie Univ. of Toronto, Toronto, Ontario, Canada, 2012 | 79 | 2012 |
Tackling runtime-based obfuscation in android with {TIRO} MY Wong, D Lie 27th USENIX security symposium (USENIX security 18), 1247-1262, 2018 | 73 | 2018 |