What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
David Lie
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector.
He Shuang
Lianying Zhao
David Lie
2025
conf/ndss
EvoCrawl: Exploring Web Application Code and State using Evolutionary Search.
Xiangyu Guo
Akshay Kawlay
Eric Liu
David Lie
2025
conf/uss
Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels.
Yuqin Yan
Wei Huang
Ilya Grishchenko
Gururaj Saileshwar
Aastha Mehta
David Lie
2023
conf/uss
Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning.
Wenjun Qiu
David Lie
Lisa M. Austin
2023
conf/dsn
vWitness: Certifying Web Page Interactions with Computer Vision.
He Shuang
Lianying Zhao
David Lie
2022
conf/asiaccs
Driving Execution of Target Paths in Android Applications with (a) CAR.
Michelle Y. Wong
David Lie
2021
conf/uss
A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions.
Weicheng Cao
Chunqiu Xia
Sai Teja Peddinti
David Lie
Nina Taft
Lisa M. Austin
2021
conf/sp
Machine Unlearning.
Lucas Bourtoule
Varun Chandrasekaran
Christopher A. Choquette-Choo
Hengrui Jia
Adelin Travers
Baiwu Zhang
David Lie
Nicolas Papernot
2021
conf/ndss
Emilia: Catching Iago in Legacy Code.
Rongzhen Cui
Lianying Zhao
David Lie
2020
conf/sp
Ex-vivo dynamic analysis framework for Android device drivers.
Ivan Pustogarov
Qian Wu
David Lie
2019
conf/sp
Using Safety Properties to Generate Vulnerability Patches.
Zhen Huang
David Lie
Gang Tan
Trent Jaeger
2018
conf/uss
Tackling runtime-based obfuscation in Android with TIRO.
Michelle Y. Wong
David Lie
2016
conf/sp
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.
Zhen Huang
Mariana D'Angelo
Dhaval Miyani
David Lie
2016
conf/ndss
IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware.
Michelle Y. Wong
David Lie
2016
conf/acsac
LMP: light-weighted memory protection with hardware assistance.
Wei Huang
Zhen Huang
Dhaval Miyani
David Lie
2015
conf/ccs
SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.
Glenn Wurster
David Lie
2015
conf/sp
Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices.
Beom Heyn Kim
David Lie
2014
conf/ccs
LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes.
Zheng Wei
David Lie
2014
conf/dsn
Ocasta: Clustering Configuration Settings for Error Recovery.
Zhen Huang
David Lie
2012
conf/ccs
Unity: secure and durable personal cloud storage.
Beom Heyn Kim
Wei Huang
David Lie
2012
conf/ccs
PScout: analyzing the Android permission specification.
Kathy Wain Yee Au
Yi Fan Zhou
Zhen Huang
David Lie
2011
conf/ccs
Unicorn: two-factor attestation for data security.
Mohammad Mannan
Beom Heyn Kim
Afshar Ganjali
David Lie
2011
conf/ccs
Short paper: a look at smartphone permission models.
Kathy Wain Yee Au
Yi Fan Zhou
Zhen Huang
Phillipa Gill
David Lie
2011
conf/fc
Mercury: Recovering Forgotten Passwords Using Personal Devices.
Mohammad Mannan
David Barrera
Carson D. Brown
David Lie
Paul C. van Oorschot
2010
conf/ccs
Using hypervisors to secure commodity operating systems.
David Lie
Lionel Litty
2010
conf/uss
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation.
Phillipa Gill
Yashar Ganjali
Bernard Wong
David Lie
2008
conf/uss
Security Benchmarking using Partial Verification.
Thomas E. Hart
Marsha Chechik
David Lie
2008
conf/uss
Hypervisor Support for Identifying Covertly Executing Binaries.
Lionel Litty
H. Andrés Lagar-Cavilla
David Lie
2007
conf/uss
Quantifying the Strength of Security Systems.
David Lie
Mahadev Satyanarayanan
2003
conf/sp
Specifying and Verifying Hardware for Tamper-Resistant Software.
David Lie
John C. Mitchell
Chandramohan A. Thekkath
Mark Horowitz
Coauthors
Aastha Mehta
(1)
Adelin Travers
(1)
Afshar Ganjali
(1)
Akshay Kawlay
(1)
Baiwu Zhang
(1)
Beom Heyn Kim
(3)
Bernard Wong
(1)
Carson D. Brown
(1)
Chandramohan A. Thekkath
(1)
Christopher A. Choquette-Choo
(1)
Chunqiu Xia
(1)
David Barrera
(1)
David Lie
(30)
Dhaval Miyani
(2)
Eric Liu
(1)
Gang Tan
(1)
Glenn Wurster
(1)
Gururaj Saileshwar
(1)
H. Andrés Lagar-Cavilla
(1)
He Shuang
(2)
Hengrui Jia
(1)
Ilya Grishchenko
(1)
Ivan Pustogarov
(1)
John C. Mitchell
(1)
Kathy Wain Yee Au
(2)
Lianying Zhao
(3)
Lionel Litty
(2)
Lisa M. Austin
(2)
Lucas Bourtoule
(1)
Mahadev Satyanarayanan
(1)
Mariana D'Angelo
(1)
Mark Horowitz
(1)
Marsha Chechik
(1)
Michelle Y. Wong
(3)
Mohammad Mannan
(2)
Nicolas Papernot
(1)
Nina Taft
(1)
Paul C. van Oorschot
(1)
Phillipa Gill
(2)
Qian Wu
(1)
Rongzhen Cui
(1)
Sai Teja Peddinti
(1)
Thomas E. Hart
(1)
Trent Jaeger
(1)
Varun Chandrasekaran
(1)
Wei Huang
(3)
Weicheng Cao
(1)
Wenjun Qiu
(1)
Xiangyu Guo
(1)
Yashar Ganjali
(1)
Yi Fan Zhou
(2)
Yuqin Yan
(1)
Zhen Huang
(6)
Zheng Wei
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to