Sotabase
Home
Researchers
Career
·
Professor, Department of Electrical and Computer Engineering
,
University of Toronto
2019–
Publications
(78)
Machine Unlearning
IEEE Symposium on Security and Privacy · 2019
1,237
cited
PScout: analyzing the Android permission specification
Conference on Computer and Communications Security · 2012
830
cited
Architectural support for copy and tamper resistant software
SIGP · 2000
686
cited
Prochlo: Strong Privacy for Analytics in the Crowd
Symposium on Operating Systems Principles · 2017
287
cited
IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware
Network and Distributed System Security Symposium · 2016
252
cited
Hypervisor Support for Identifying Covertly Executing Binaries
USENIX Security Symposium · 2008
231
cited
Implementing an untrusted operating system on trusted hardware
Symposium on Operating Systems Principles · 2003
213
cited
Splitting interfaces: making trust between applications and operating systems configurable
USENIX Symposium on Operating Systems Design and Implementation · 2006
188
cited
Specifying and verifying hardware for tamper-resistant software
2003 Symposium on Security and Privacy, 2003. · 2003
114
cited
A buffer overflow benchmark for software model checkers
International Conference on Automated Software Engineering · 2007
91
cited
Dude, Where's That IP? Circumventing Measurement-based IP Geolocation
USENIX Security Symposium · 2010
91
cited
Short paper: a look at smartphone permission models
Security and Privacy in Smartphones and Mobile Devices · 2011
85
cited
Using Safety Properties to Generate Vulnerability Patches
IEEE Symposium on Security and Privacy · 2019
84
cited
The State of Public Infrastructure-as-a-Service Cloud Security
ACM Computing Surveys · 2015
73
cited
Kivati: fast detection and prevention of atomicity violations
European Conference on Computer Systems · 2010
69
cited
Manitou: a layer-below approach to fighting malware
International Conference on Anti-counterfeiting, Security, and Identification · 2006
66
cited
Using VMM-based sensors to monitor honeypots
International Conference on Virtual Execution Environments · 2006
60
cited
Tackling runtime-based obfuscation in Android with TIRO
USENIX Security Symposium · 2018
58
cited
Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response
IEEE Symposium on Security and Privacy · 2016
58
cited
A simple method for extracting models from protocol code
Proceedings 28th Annual International Symposium on Computer Architecture · 2001
51
cited
Show all 78 papers →
Sotabase
David Lie | Researcher Profile | Sotabase | Sotabase