The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Lie: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Lie, Chandramohan A. Thekkath, Mark Mitchell, Patrick Lincoln, Dan Boneh, John C. Mitchell, Mark Horowitz
    Architectural Support for Copy and Tamper Resistant Software. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2000, pp:168-177 [Conf]
  2. Lionel Litty, David Lie
    Manitou: a layer-below approach to fighting malware. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:6-11 [Conf]
  3. David Lie, Andy Chou, Dawson R. Engler, David L. Dill
    A simple method for extracting models for protocol code. [Citation Graph (0, 0)][DBLP]
    ISCA, 2001, pp:192-203 [Conf]
  4. Richard Ta-Min, Lionel Litty, David Lie
    Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable. [Citation Graph (0, 0)][DBLP]
    OSDI, 2006, pp:279-292 [Conf]
  5. David Lie, Chandramohan A. Thekkath, Mark Horowitz
    Implementing an untrusted operating system on trusted hardware. [Citation Graph (0, 0)][DBLP]
    SOSP, 2003, pp:178-192 [Conf]
  6. David Lie, John C. Mitchell, Chandramohan A. Thekkath, Mark Horowitz
    Specifying and Verifying Hardware for Tamper-Resistant Software. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:166-0 [Conf]
  7. Kurniadi Asrigo, Lionel Litty, David Lie
    Using VMM-based sensors to monitor honeypots. [Citation Graph (0, 0)][DBLP]
    VEE, 2006, pp:13-23 [Conf]

  8. Computer Meteorology: Monitoring Compute Clouds. [Citation Graph (, )][DBLP]


  9. Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical. [Citation Graph (, )][DBLP]


  10. A buffer overflow benchmark for software model checkers. [Citation Graph (, )][DBLP]


  11. PtYasm: Software Model Checking with Proof Templates. [Citation Graph (, )][DBLP]


  12. Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates. [Citation Graph (, )][DBLP]


  13. Security Benchmarking using Partial Verification. [Citation Graph (, )][DBLP]


  14. Hypervisor Support for Identifying Covertly Executing Binaries. [Citation Graph (, )][DBLP]


  15. Kivati: fast detection and prevention of atomicity violations. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002