David Lie

Orcid: 0000-0002-2000-6827

Affiliations:
  • University of Toronto, Canada


According to our database1, David Lie authored at least 68 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector.
CoRR, 2024

Stream Processing with Adaptive Edge-Enhanced Confidential Computing.
Proceedings of the 7th International Workshop on Edge Systems, Analytics and Networking, 2024

2023
Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement.
ACM Comput. Surv., 2023

Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails.
CoRR, 2023

Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

vWitness: Certifying Web Page Interactions with Computer Vision.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning.
CoRR, 2022

Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Driving Execution of Target Paths in Android Applications with (a) CAR.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples.
CoRR, 2021

A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions.
Proceedings of the 30th USENIX Security Symposium, 2021

Machine Unlearning.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Emilia: Catching Iago in Legacy Code.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Accelerating Symbolic Analysis for Android Apps.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Aion Attacks: Manipulating Software Timers in Trusted Execution Environment.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Using Safety Properties to Generate Vulnerability Patches.
login Usenix Mag., 2020

Is Hardware More Secure Than Software?
IEEE Secur. Priv., 2020

Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification.
CoRR, 2020

Using Context and Interactions to Verify User-Intended Network Requests.
CoRR, 2020

Ex-vivo dynamic analysis framework for Android device drivers.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
SoK: Hardware Security Support for Trustworthy Execution.
CoRR, 2019

MultiK: A Framework for Orchestrating Multiple Specialized Kernels.
CoRR, 2019

Using Inputs and Context to Verify User Intentions in Internet Services.
Proceedings of the 10th ACM SIGOPS Asia-Pacific Workshop on Systems, 2019

2018
Tackling runtime-based obfuscation in Android with TIRO.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Senx: Sound Patch Generation for Security Vulnerabilities.
CoRR, 2017

SAIC: Identifying Configuration Files for System Configuration Management.
CoRR, 2017

BinPro: A Tool for Binary Source Code Provenance.
CoRR, 2017

Unity 2.0: Secure and Durable Personal Cloud Storage.
CoRR, 2017

The Case for a Single System Image for Personal Devices.
CoRR, 2017

Prochlo: Strong Privacy for Analytics in the Crowd.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Glimmers: Resolving the Privacy/Trust Quagmire.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

Consistency Oracles: Towards an Interactive and Flexible Consistency Model Specification.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

2016
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

LMP: light-weighted memory protection with hardware assistance.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
The State of Public Infrastructure-as-a-Service Cloud Security.
ACM Comput. Surv., 2015

Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Ocasta: Clustering Configuration Settings for Error Recovery.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2012
Unity: secure and durable personal cloud storage.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

PScout: analyzing the Android permission specification.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Patch auditing in infrastructure as a service clouds.
Proceedings of the 7th International Conference on Virtual Execution Environments, 2011

Mercury: Recovering Forgotten Passwords Using Personal Devices.
Proceedings of the Financial Cryptography and Data Security, 2011

Unicorn: two-factor attestation for data security.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Short paper: a look at smartphone permission models.
Proceedings of the SPSM'11, 2011

2010
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation.
Proceedings of the 19th USENIX Security Symposium, 2010

Kivati: fast detection and prevention of atomicity violations.
Proceedings of the European Conference on Computer Systems, 2010

Using hypervisors to secure commodity operating systems.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Computer Meteorology: Monitoring Compute Clouds.
Proceedings of HotOS'09: 12th Workshop on Hot Topics in Operating Systems, 2009

2008
Hypervisor Support for Identifying Covertly Executing Binaries.
Proceedings of the 17th USENIX Security Symposium, 2008

Security Benchmarking using Partial Verification.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

PtYasm: Software Model Checking with Proof Templates.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE 2008), 2008

2007
Quantifying the Strength of Security Systems.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

A buffer overflow benchmark for software model checkers.
Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007), 2007

Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical.
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

2006
Using VMM-based sensors to monitor honeypots.
Proceedings of the 2nd International Conference on Virtual Execution Environments, 2006

Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable.
Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI '06), 2006

Manitou: a layer-below approach to fighting malware.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2003
Specifying and Verifying Hardware for Tamper-Resistant Software.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Implementing an untrusted operating system on trusted hardware.
Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, 2003

2001
A simple method for extracting models for protocol code.
Proceedings of the 28th Annual International Symposium on Computer Architecture, 2001

2000
Architectural Support for Copy and Tamper Resistant Software.
Proceedings of the ASPLOS-IX Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems, 2000


  Loading...