David Lie

Publications

Here are some of the publications I have authored with my students.  They are published at among the best venues in the world for computer security and systems software research. I hope you enjoy them!

All PDF files will open in a built-in viewer.  To download the PDF file, click on the download button in the upper right, or right click on the link in your browser.

44 results

2018
[44]Wei Huang, Vasily Rudchenko, He Shuang, Zhen Huang and David Lie, “Pearl-TEE: supporting untrusted applications in TrustZone“, In Proceedings of the 3rd Workshop on System Software for Trusted Execution (SysTEX 2018), 2018. [bibtex]
[43]Michelle Wong and David Lie, “Tackling runtime-based obfuscation in Android with TIRO“, In Proceedings of the 27th USENIX Security Symposium, 2018. (slides, source code) [bibtex]
[42]Lisa M. Austin, David Lie, Peter Yi Ping Sun, Robin Spilette, Michelle Wong and Mariana D’Angelo, “Towards Dynamic transparency: The AppTrans (Transparency for Android applications) project“, 3203601, SSRN, no. 3203601, 2018. (Available at SSRN 3203601) [bibtex]
2017
[41]Andrea Bittau, Úlfar Erlingsson, Petros Maniatis, Ilya Mironov, Ananth Raghunathan, David Lie, Mitch Rudominer, Ushasree Kode, Julien Tinnes and Bernhard Seefeld, “Prochlo: Strong privacy for analytics in the crowd“, In Proceedings of the 26th ACM Symposium on Operating Systems Principles (SOSP), 2017. [bibtex]
[40]Beom Heyn Kim, Sukwon Oh and David Lie, “Consistency Oracles: Towards an interactive and flexible consistency model specification“, In Proceedings of the 16th USENIX Workshop on Hot Topics in Operating Systems (HotOS), 2017. [bibtex]
[39]David Lie and Petros Maniatis, “Glimmers: Resolving the privacy/trust quagmire“, In Proceedings of the 16th USENIX Workshop on Hot Topics in Operating Systems (HotOS), 2017. [bibtex]
2016
[38]Wei Huang, Zhen Huang and David Lie, “LMP: Light-weighted memory protection with hardware assistance“, In Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC), 2016. [bibtex]
[37]Zhen Huang, Mariana D’Angelo, Dhaval Miyani and David Lie, “Talos: Neutralizing vulnerabilities with security workarounds for rapid response“, In Proceedings of the 37th IEEE Symposium on Security and Privacy, pp. 618–635, 2016. (source code) [bibtex]
[36]Michelle Wong and David Lie, “IntelliDroid: A targeted input generator for the dynamic analysis of Android malware“, In Proceedings of the 2016 Symposium on Network and Distributed System Security (NDSS), 2016. (slides, source code) [bibtex]
2015
[35]Beom Heyn Kim and David Lie, “Caelus: Verifying the consistency of cloud services with battery-powered devices“, In Proceedings of the 36th IEEE Symposium on Security and Privacy, 2015. [bibtex]
[34]Huang, Wei, Ganjali, Afshar, Kim, Beom Heyn, Oh, Sukwon and Lie, David, “The state of public infrastructure-as-a-service cloud security“, In ACM Computing Surveys (CSUR), ACM, vol. 47, no. 4, pp. 68, 2015. [bibtex]
2014
[33]Zheng Wei and David Lie, “LazyTainter: Memory-efficient taint tracking in managed runtimes“, In Proceedings of the The 4th Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2014. [bibtex]
[32]Zhen Huang and David Lie, “Ocasta: Clustering configuration settings for error recovery“, In Proceedings of the 44th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2014. (source code) [bibtex]
2012
[31]Beom Heyn Kim, Wei Huang and David Lie, “Unity: Secure and durable personal cloud storage“, In Proceedings of the ACM Cloud Computing Security Workshop (CCSW), 2012. [bibtex]
[30]Afshar Ganjali and David Lie, “Auditing cloud administrators using information flow tracking“, In Proceedings of the 7th Workshop on Scalable Trusted Computing (STC), 2012. [bibtex]
[29]Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang and David Lie, “PScout: Analyzing the Android permission specification“, In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), 2012. (Source code and permission maps.) [bibtex]
2011
[28]Mohammad Mannan, Beom Heyn Kim, Afshar Ganjali and David Lie, “Unicorn: Two-factor attestation for data security“, In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS), pp. 17–28, 2011. [bibtex]
[27]Kathy Wain Yee Au, Yi Fan Zhou, Zhen Huang, Phillipa Gill and David Lie, “Short paper: A look at smartphone permission models“, In The 1st Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pp. 63–67, 2011. [bibtex]
[26]Lionel Litty and David Lie, “Patch auditing in infrastructure as a service clouds“, In Proceedings of the 7th International Conference on Virtual Execution Environments (VEE), pp. 145–156, 2011. [bibtex]
[25]Mohammed Mannan, David Barrera, Carson Brown, Paul Van Oorschot and David Lie, “Mercury: Recovering forgotten passwords using personal devices“, In Proceedings of the Financial Cryptography and Data Security (FC), 2011. [bibtex]
2010
[24]David Lie and Lionel Litty, “Using hypervisors to secure commodity operating systems“, In Proceedings of the 5th Workshop on Scalable Trusted Computing (STC), 2010. [bibtex]
[23]Phillipa Gill, Yashar Ganjali, Bernard Wong and David Lie, “Dude where’s that IP? Circumventing measurement-based IP geolocation“, In Proceedings of the 19th USENIX Security Symposium, 2010. [bibtex]
[22]Lee Chew and David Lie, “Kivati: Fast detection and prevention of atomicity violations“, In Proceedings of the 2010 ACM European Conference on Computer Systems (EuroSys), pp. 307–320, 2010. [bibtex]
2009
[21]Lionel Litty, Horacio Andrés Lagar-Cavilla and David Lie, “Computer meteorology: Monitoring compute clouds“, In Proceedings of the 12th USENIX Workshop on Hot Topics in Operating Systems (HotOS), 2009. [bibtex]
2008
[20]Thomas E. Hart, Kelvin Ku, David Lie, Marsha Chechik and Arie Gurfinkel, “Augmenting counterexample-guided abstraction refinement with proof templates“, In Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2008. [bibtex]
[19]Thomas E. Hart, Kelvin Ku, David Lie, Marsha Chechik and Arie Gurfinkel, “PtYasm: Software model checking with proof templates“, In The Tools Track of the 23rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2008. [bibtex]
[18]Thomas E. Hart, Marsha Chechik and David Lie, “Security benchmarking using partial verification“, In Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HOTSEC), 2008. [bibtex]
[17]Lionel Litty, Horacio Andrés Lagar-Cavilla and David Lie, “Hypervisor support for identifying covertly executing binaries“, In Proceedings of the 17th USENIX Security Symposium, pp. 243–258, 2008. [bibtex]
[16]Thomas E. Hart, Kelvin Ku, David Lie, Marsha Chechik and Arie Gurfinkel, “Augmenting counterexample-guided abstraction refinement with proof templates“, CSRG-581, Department of Computer Science, University of Toronto, no. CSRG-581, 2008. [bibtex]
2007
[15]Kelvin Ku, Thomas E. Hart, Marsha Chechik and David Lie, “A buffer overflow benchmark for software model checkers“, In Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2007. [bibtex]
[14]David Lie and M. Satyanarayanan, “Quantifying the strength of security systems“, In Proceedings of the 2nd USENIX Workshop on Hot Topics in Security (HOTSEC), 2007. [bibtex]
[13]Jesse Pool, Ian Sin Kwok Wong and David Lie, “Relaxed determinism: Making redundant execution on multiprocessors practical“, In Proceedings of the 11th USENIX Workshop on Hot Topics in Operating Systems (HotOS), pp. 25–30, 2007. [bibtex]
2006
[12]Richard Ta-Min, Lionel Litty and David Lie, “Splitting interfaces: Making trust between applications and operating systems configurable“, In Proceedings of the 7th Symposium on Operating Systems Design and Implementation (OSDI), pp. 279–292, 2006. [bibtex]
[11]Lionel Litty and David Lie, “Manitou: A layer-below approach to fighting malware“, In Proceedings of the Workshop on Architectural and System Support for Improving Software Dependability (ASID), pp. 6–11, 2006. [bibtex]
[10]Kurniadi Asrigo, Lionel Litty and David Lie, “Using VMM-based sensors to monitor honeypots“, In Proceedings of the 2nd International Conference on Virtual Execution Environments (VEE), pp. 13–23, 2006. [bibtex]
2004
[9]Alan Messer, Phillippe Bernadat, Guangrui Fu, Deqing Chen, Zoran Dimitrijevic, David Lie, Durga Devi Mannaru, Alma Riska and Dejan Milojicic, “Susceptibility of commodity systems and software to memory soft errors“, In IEEE Transactions on Computing, pp. 1557–1568, 2004. [bibtex]
2003
[8]David Lie, Chandramohan A. Thekkath and Mark Horowitz, “Implementing an untrusted operating system on trusted hardware“, In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), pp. 178–192, 2003. [bibtex]
[7]D. Lie, John Mitchell, C. Thekkath and M. Horowitz, “Specifying and verifying hardware for tamper-resistant software“, In Proceedings of the 24th IEEE Symposium on Security and Privacy, 2003. [bibtex]
[6]David Lie, “Architectural Support for Copy and Tamper-Resistant Software“, PhD thesis, Department of Electrical Engineering, Stanford University, 2003. [bibtex]
2001
[5]David Lie, Andy Chou, Dawson Engler and David Dill, “A simple method for extracting models from protocol code“, In Proceedings of the 28th International Symposium on Computer Architecture (ISCA), pp. 192–203, 2001. [bibtex]
[4]Deqing Chen, Alan Messer, Philippe Bernadat, Guangrui Fu, Zoran Dimitrijevic, David Lie, Durga Mannaru, Alma Riska and Dejan Milojicic, “JVM susceptibility to memory errors“, In Proceedings of the 2001 Java Machine Research and Technology Symposium(JVM), pp. 67–87, 2001. [bibtex]
[3]Alan Messer, Philippe Bernadat, Guangrui Fu, Deqing Chen, Zoran Dimitrijevic, David Lie, Durga Devi Mannaru, Alma Riska and Dejan Milojicic, “Susceptibility of modern systems and software to soft errors“, HPL-2001-43, Hewlett Packard Laboratories, no. HPL-2001-43, 2001. [bibtex]
2000
[2]David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John Mitchell and Mark Horowitz, “Architectural support for copy and tamper resistant software“, In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 168–177, 2000. [bibtex]
[1]Dan Boneh, David Lie, Patrick Lincoln, John Mitchell and Mark Mitchell, “Hardware support for tamper-resistant and copy-resistant software“, CS-TN-00-97, Department of Computer Science, Stanford University, no. CS-TN-00-97, 2000. [bibtex]