<?xml version="1.0"?>
<dblpperson name="David Lie" pid="l/DavidLie" n="95">
<person key="homepages/l/DavidLie" mdate="2024-05-01">
<author pid="l/DavidLie">David Lie</author>
<note type="affiliation">University of Toronto, Canada</note>
<url>http://www.eecg.toronto.edu/~lie/</url>
<url>https://scholar.google.com/citations?user=Qm_3B70AAAAJ</url>
<url>https://orcid.org/0000-0002-2000-6827</url>
<url>https://www.wikidata.org/entity/Q114967828</url>
</person>
<r><inproceedings key="conf/acsac/XuLHGL25" mdate="2026-03-10">
<author pid="69/9079">Shengjie Xu</author>
<author pid="54/6550">Eric Liu</author>
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="180/7263">Ilya Grishchenko</author>
<author pid="l/DavidLie">David Lie</author>
<title>PSan: Towards Hybrid Metadata Scheme for Efficient Pointer Checking.</title>
<booktitle>ACSAC</booktitle>
<year>2025</year>
<pages>278-290</pages>
<crossref>conf/acsac/2025</crossref>
<ee>https://doi.org/10.1109/ACSAC67867.2025.00035</ee>
<url>db/conf/acsac/acsac2025.html#XuLHGL25</url>
<stream>streams/conf/acsac</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/GuoKLL25" mdate="2025-03-19">
<author pid="164/9677">Xiangyu Guo</author>
<author pid="400/4745">Akshay Kawlay</author>
<author pid="54/6550">Eric Liu</author>
<author pid="l/DavidLie">David Lie</author>
<title>EvoCrawl: Exploring Web Application Code and State using Evolutionary Search.</title>
<year>2025</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss-paper/evocrawl-exploring-web-application-code-and-state-using-evolutionary-search/</ee>
<crossref>conf/ndss/2025</crossref>
<url>db/conf/ndss/ndss2025.html#GuoKLL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/ShuangZL25" mdate="2025-03-19">
<author pid="246/9380">He Shuang</author>
<author pid="140/6495">Lianying Zhao</author>
<author pid="l/DavidLie">David Lie</author>
<title>Duumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector.</title>
<year>2025</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss-paper/duumviri-detecting-trackers-and-mixed-trackers-with-a-breakage-detector/</ee>
<crossref>conf/ndss/2025</crossref>
<url>db/conf/ndss/ndss2025.html#ShuangZL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/Yan0GSML25" mdate="2025-10-31">
<author pid="373/3644">Yuqin Yan</author>
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="180/7263">Ilya Grishchenko</author>
<author pid="196/6747">Gururaj Saileshwar</author>
<author pid="161/0164">Aastha Mehta</author>
<author pid="l/DavidLie">David Lie</author>
<title>Relocate-Vote: Using Sparsity Information to Exploit Ciphertext Side-Channels.</title>
<pages>5699-5717</pages>
<year>2025</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity25/presentation/yan-yuqin</ee>
<crossref>conf/uss/2025</crossref>
<url>db/conf/uss/uss2025.html#Yan0GSML25</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2025" mdate="2025-11-24">
<editor pid="08/3422">Chun-Ying Huang</editor>
<editor pid="81/797">Jyh-Cheng Chen</editor>
<editor pid="s/ShiuhPyngShieh">Shiuh-Pyng Shieh</editor>
<editor pid="l/DavidLie">David Lie</editor>
<editor pid="65/550">V&#233;ronique Cortier</editor>
<title>Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, CCS 2025, Taipei, Taiwan, October 13-17, 2025</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2025</year>
<isbn>979-8-4007-1525-9</isbn>
<ee>https://doi.org/10.1145/3719027</ee>
<url>db/conf/ccs/ccs2025.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2502-04360" mdate="2025-03-12">
<author pid="19/1374">Xiao Hu</author>
<author pid="54/6550">Eric Liu</author>
<author pid="41/8593">Weizhou Wang</author>
<author pid="164/9677">Xiangyu Guo</author>
<author pid="l/DavidLie">David Lie</author>
<title>MARAGE: Transferable Multi-Model Adversarial Attack for Retrieval-Augmented Generation Data Extraction.</title>
<year>2025</year>
<month>February</month>
<volume>abs/2502.04360</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2502.04360</ee>
<url>db/journals/corr/corr2502.html#abs-2502-04360</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2511-21577" mdate="2026-01-14">
<author pid="86/8898">Kexin Li</author>
<author pid="19/1374">Xiao Hu</author>
<author pid="180/7263">Ilya Grishchenko</author>
<author pid="l/DavidLie">David Lie</author>
<title>HarmonicAttack: An Adaptive Cross-Domain Audio Watermark Removal.</title>
<year>2025</year>
<month>November</month>
<volume>abs/2511.21577</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2511.21577</ee>
<url>db/journals/corr/corr2511.html#abs-2511-21577</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2512-00094" mdate="2026-01-17">
<author pid="86/8898">Kexin Li</author>
<author pid="383/0908">Guozhen Ding</author>
<author pid="180/7263">Ilya Grishchenko</author>
<author pid="l/DavidLie">David Lie</author>
<title>HMARK: Radioactive Multi-Bit Semantic-Latent Watermarking for Diffusion Models.</title>
<year>2025</year>
<month>December</month>
<volume>abs/2512.00094</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2512.00094</ee>
<url>db/journals/corr/corr2512.html#abs-2512-00094</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2512-22789" mdate="2026-01-27">
<author pid="22/1805-95">Ying Li 0095</author>
<author pid="150/8244">Wenjun Qiu</author>
<author pid="180/3862">Faysal Hossain Shezan</author>
<author pid="329/3620">Kunlin Cai</author>
<author pid="342/3927">Michelangelo van Dam</author>
<author pid="169/3376">Lisa M. Austin</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="39/5423-1">Yuan Tian 0001</author>
<title>Breaking the illusion: Automated Reasoning of GDPR Consent Violations.</title>
<year>2025</year>
<month>December</month>
<volume>abs/2512.22789</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2512.22789</ee>
<url>db/journals/corr/corr2512.html#abs-2512-22789</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/csur/ZhaoSXHCBL24" mdate="2025-01-19">
<author orcid="0000-0002-6376-4062" pid="140/6495">Lianying Zhao</author>
<author orcid="0009-0001-0637-7947" pid="246/9380">He Shuang</author>
<author orcid="0000-0001-5189-7610" pid="69/9079">Shengjie Xu</author>
<author orcid="0000-0003-1231-1394" pid="81/6685-27">Wei Huang 0027</author>
<author orcid="0009-0005-9282-2531" pid="165/2824">Rongzhen Cui</author>
<author orcid="0009-0006-1123-7662" pid="246/9043">Pushkar Bettadpur</author>
<author orcid="0000-0002-2000-6827" pid="l/DavidLie">David Lie</author>
<title>A Survey of Hardware Improvements to Secure Program Execution.</title>
<pages>311:1-311:37</pages>
<year>2024</year>
<month>December</month>
<volume>56</volume>
<journal>ACM Comput. Surv.</journal>
<number>12</number>
<ee>https://doi.org/10.1145/3672392</ee>
<ee>https://www.wikidata.org/entity/Q131113453</ee>
<url>db/journals/csur/csur56.html#ZhaoSXHCBL24</url>
<stream>streams/journals/csur</stream>
</article>
</r>
<r><inproceedings key="conf/edgesys/YanM0MBL24" mdate="2025-01-19">
<author orcid="0009-0009-3083-0738" pid="373/3644">Yuqin Yan</author>
<author orcid="0000-0002-3658-0276" pid="233/9256">Pritish Mishra</author>
<author orcid="0000-0003-1231-1394" pid="81/6685-27">Wei Huang 0027</author>
<author orcid="0009-0005-3416-5254" pid="161/0164">Aastha Mehta</author>
<author orcid="0000-0002-6822-8891" pid="157/1134">Oana Balmau</author>
<author orcid="0000-0002-2000-6827" pid="l/DavidLie">David Lie</author>
<title>Stream Processing with Adaptive Edge-Enhanced Confidential Computing.</title>
<pages>37-42</pages>
<year>2024</year>
<booktitle>EdgeSys@EuroSys</booktitle>
<ee>https://doi.org/10.1145/3642968.3654819</ee>
<ee>https://www.wikidata.org/entity/Q131121058</ee>
<crossref>conf/edgesys/2024</crossref>
<url>db/conf/edgesys/edgesys2024.html#YanM0MBL24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wcre/YangLP24" mdate="2024-07-30">
<author pid="56/10361">Mingyue Yang</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>Exploring Strategies for Guiding Symbolic Analysis with Machine Learning Prediction.</title>
<pages>659-669</pages>
<year>2024</year>
<booktitle>SANER</booktitle>
<ee>https://doi.org/10.1109/SANER60148.2024.00073</ee>
<crossref>conf/wcre/2024</crossref>
<url>db/conf/wcre/saner2024.html#YangLP24</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2024" mdate="2024-12-10">
<editor pid="71/2890">Bo Luo</editor>
<editor pid="129/1113">Xiaojing Liao</editor>
<editor pid="90/514-24">Jun Xu 0024</editor>
<editor pid="k/EnginKirda">Engin Kirda</editor>
<editor pid="l/DavidLie">David Lie</editor>
<title>Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2024</year>
<isbn>979-8-4007-0636-3</isbn>
<ee>https://doi.org/10.1145/3658644</ee>
<url>db/conf/ccs/ccs2024.html</url>
</proceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2401-08038" mdate="2025-07-04">
<author orcid="0009-0006-2375-1722" pid="150/8244">Wenjun Qiu</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="169/3376">Lisa M. Austin</author>
<title>Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning.</title>
<year>2024</year>
<volume>abs/2401.08038</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2401.08038</ee>
<url>db/journals/corr/corr2401.html#abs-2401-08038</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2402-08031" mdate="2024-02-19">
<author pid="246/9380">He Shuang</author>
<author pid="140/6495">Lianying Zhao</author>
<author pid="l/DavidLie">David Lie</author>
<title>Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector.</title>
<year>2024</year>
<volume>abs/2402.08031</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2402.08031</ee>
<url>db/journals/corr/corr2402.html#abs-2402-08031</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-07440" mdate="2024-06-15">
<author pid="282/3748">Mu-Huan Chung</author>
<author pid="341/5700">Sharon Li</author>
<author pid="198/8232">Jaturong Kongmanee</author>
<author pid="49/3800-4">Lu Wang 0004</author>
<author pid="52/5811-7">Yuhong Yang 0007</author>
<author pid="341/5557">Calvin Giang</author>
<author pid="341/5891">Khilan Jerath</author>
<author pid="282/3590">Abhay Raman</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="08/2050">Mark H. Chignell</author>
<title>Maximizing Information Gain in Privacy-Aware Active Learning of Email Anomalies.</title>
<year>2024</year>
<volume>abs/2405.07440</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.07440</ee>
<url>db/journals/corr/corr2405.html#abs-2405-07440</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2405-16361" mdate="2024-06-18">
<author pid="86/8898">Kexin Li</author>
<author pid="217/8793">Yang Xi</author>
<author pid="161/0164">Aastha Mehta</author>
<author pid="l/DavidLie">David Lie</author>
<title>LDPKiT: Recovering Utility in LDP Schemes by Training with Noise^2.</title>
<year>2024</year>
<volume>abs/2405.16361</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2405.16361</ee>
<url>db/journals/corr/corr2405.html#abs-2405-16361</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2408-16028" mdate="2024-09-28">
<author pid="41/8593">Weizhou Wang</author>
<author pid="54/6550">Eric Liu</author>
<author pid="164/9677">Xiangyu Guo</author>
<author pid="l/DavidLie">David Lie</author>
<title>ANVIL: Anomaly-based Vulnerability Identification without Labelled Training Data.</title>
<year>2024</year>
<volume>abs/2408.16028</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2408.16028</ee>
<url>db/journals/corr/corr2408.html#abs-2408-16028</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2412-15431" mdate="2025-01-23">
<author pid="190/6812">Tianchen Zhang</author>
<author pid="196/6747">Gururaj Saileshwar</author>
<author pid="l/DavidLie">David Lie</author>
<title>Time Will Tell: Timing Side Channels via Output Token Count in Large Language Models.</title>
<year>2024</year>
<volume>abs/2412.15431</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2412.15431</ee>
<url>db/journals/corr/corr2412.html#abs-2412-15431</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/csur/Chung00CJRLC23" mdate="2025-08-05">
<author pid="282/3748">Mu-Huan Chung</author>
<author pid="52/5811-7">Yuhong Yang 0007</author>
<author pid="49/3800-4">Lu Wang 0004</author>
<author pid="365/9408">Greg Cento</author>
<author orcid="0000-0003-0518-4227" pid="341/5891">Khilan Jerath</author>
<author orcid="0000-0002-4193-1464" pid="282/3590">Abhay Raman</author>
<author orcid="0000-0002-2000-6827" pid="l/DavidLie">David Lie</author>
<author orcid="0000-0001-8120-6905" pid="08/2050">Mark H. Chignell</author>
<title>Implementing Data Exfiltration Defense in Situ: A Survey of Countermeasures and Human Involvement.</title>
<pages>303:1-303:37</pages>
<year>2023</year>
<volume>55</volume>
<journal>ACM Comput. Surv.</journal>
<number>14s</number>
<ee>https://doi.org/10.1145/3582077</ee>
<ee>https://www.wikidata.org/entity/Q130877306</ee>
<url>db/journals/csur/csur55.html#Chung00CJRLC23</url>
</article>
</r>
<r><inproceedings key="conf/dsn/ShuangZL23" mdate="2024-08-04">
<author pid="246/9380">He Shuang</author>
<author orcid="0000-0002-6376-4062" pid="140/6495">Lianying Zhao</author>
<author pid="l/DavidLie">David Lie</author>
<title>vWitness: Certifying Web Page Interactions with Computer Vision.</title>
<pages>431-444</pages>
<year>2023</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN58367.2023.00048</ee>
<crossref>conf/dsn/2023</crossref>
<url>db/conf/dsn/dsn2023.html#ShuangZL23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/LiuXL23" mdate="2025-03-03">
<author orcid="0009-0001-3980-2364" pid="54/6550">Eric Liu</author>
<author orcid="0000-0001-5189-7610" pid="69/9079">Shengjie Xu</author>
<author pid="l/DavidLie">David Lie</author>
<title>FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers.</title>
<pages>1061-1072</pages>
<year>2023</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1109/ASE56229.2023.00100</ee>
<ee>https://www.wikidata.org/entity/Q130888898</ee>
<crossref>conf/kbse/2023</crossref>
<url>db/conf/kbse/ase2023.html#LiuXL23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/raid/XuL0L23" mdate="2025-01-19">
<author orcid="0000-0001-5189-7610" pid="69/9079">Shengjie Xu</author>
<author orcid="0009-0001-3980-2364" pid="54/6550">Eric Liu</author>
<author orcid="0000-0003-1231-1394" pid="81/6685-27">Wei Huang 0027</author>
<author orcid="0000-0002-2000-6827" pid="l/DavidLie">David Lie</author>
<title>MIFP: Selective Fat-Pointer Bounds Compression for Accurate Bounds Checking.</title>
<pages>609-622</pages>
<year>2023</year>
<booktitle>RAID</booktitle>
<ee>https://doi.org/10.1145/3607199.3607212</ee>
<ee>https://www.wikidata.org/entity/Q131020082</ee>
<crossref>conf/raid/2023</crossref>
<url>db/conf/raid/raid2023.html#XuL0L23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/QiuLA23" mdate="2023-10-18">
<author pid="150/8244">Wenjun Qiu</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="169/3376">Lisa M. Austin</author>
<title>Calpric: Inclusive and Fine-grain Labeling of Privacy Policies with Crowdsourcing and Active Learning.</title>
<year>2023</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity23/presentation/qiu</ee>
<crossref>conf/uss/2023</crossref>
<url>db/conf/uss/uss2023.html#QiuLA23</url>
<pages>1055-1072</pages>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2303-00870" mdate="2024-01-18">
<author pid="282/3748">Mu-Huan Chung</author>
<author pid="49/3800-4">Lu Wang 0004</author>
<author pid="341/5700">Sharon Li</author>
<author pid="52/5811-7">Yuhong Yang 0007</author>
<author pid="341/5557">Calvin Giang</author>
<author pid="341/5891">Khilan Jerath</author>
<author pid="282/3590">Abhay Raman</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="08/2050">Mark H. Chignell</author>
<title>Implementing Active Learning in Cybersecurity: Detecting Anomalies in Redacted Emails.</title>
<year>2023</year>
<volume>abs/2303.00870</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2303.00870</ee>
<url>db/journals/corr/corr2303.html#abs-2303-00870</url>
</article>
</r>
<r><inproceedings key="conf/asiaccs/WongL22" mdate="2025-01-19">
<author pid="182/4674">Michelle Y. Wong</author>
<author pid="l/DavidLie">David Lie</author>
<title>Driving Execution of Target Paths in Android Applications with (a) CAR.</title>
<pages>888-902</pages>
<year>2022</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3488932.3497765</ee>
<ee>https://www.wikidata.org/entity/Q131128426</ee>
<crossref>conf/asiaccs/2022</crossref>
<url>db/conf/asiaccs/asiaccs2022.html#WongL22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nips/WangSSLP22" mdate="2024-01-08">
<author pid="44/740">Jiaqi Wang</author>
<author pid="180/8190">Roei Schuster</author>
<author pid="213/8587">Ilia Shumailov</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>In Differential Privacy, There is Truth: on Vote-Histogram Leakage in Ensemble Private Learning.</title>
<year>2022</year>
<crossref>conf/nips/2022</crossref>
<booktitle>NeurIPS</booktitle>
<ee type="oa">http://papers.nips.cc/paper_files/paper/2022/hash/ba8d1b46292c5e82cbfb3b3dc3b968af-Abstract-Conference.html</ee>
<url>db/conf/nips/neurips2022.html#WangSSLP22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/usenix/KimKL22" mdate="2024-07-16">
<author pid="05/10299">Beom Heyn Kim</author>
<author pid="38/8882">Taesoo Kim</author>
<author pid="l/DavidLie">David Lie</author>
<title>Modulo: Finding Convergence Failure Bugs in Distributed Systems with Divergence Resync Models.</title>
<pages>383-398</pages>
<year>2022</year>
<booktitle>USENIX ATC</booktitle>
<ee type="oa">https://www.usenix.org/conference/atc22/presentation/kim-beom-heyn</ee>
<crossref>conf/usenix/2022</crossref>
<url>db/conf/usenix/usenix2022.html#KimKL22</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2209-10732" mdate="2022-09-28">
<author pid="44/740">Jiaqi Wang</author>
<author pid="180/8190">Roei Schuster</author>
<author pid="213/8587">Ilia Shumailov</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>In Differential Privacy, There is Truth: On Vote Leakage in Ensemble Private Learning.</title>
<year>2022</year>
<volume>abs/2209.10732</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2209.10732</ee>
<url>db/journals/corr/corr2209.html#abs-2209-10732</url>
</article>
</r>
<r><inproceedings key="conf/asplos/Xu0L21" mdate="2025-01-19">
<author orcid="0000-0001-5189-7610" pid="69/9079">Shengjie Xu</author>
<author orcid="0000-0003-1231-1394" pid="81/6685-27">Wei Huang 0027</author>
<author orcid="0000-0002-2000-6827" pid="l/DavidLie">David Lie</author>
<title>In-fat pointer: hardware-assisted tagged-pointer spatial memory safety defense with subobject granularity protection.</title>
<pages>224-240</pages>
<year>2021</year>
<booktitle>ASPLOS</booktitle>
<ee>https://doi.org/10.1145/3445814.3446761</ee>
<ee>https://www.wikidata.org/entity/Q130983077</ee>
<crossref>conf/asplos/2021</crossref>
<url>db/conf/asplos/asplos2021.html#Xu0L21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dimva/0027XCL21" mdate="2024-08-04">
<author pid="81/6685-27">Wei Huang 0027</author>
<author orcid="0000-0001-5189-7610" pid="69/9079">Shengjie Xu</author>
<author pid="15/8296">Yueqiang Cheng</author>
<author pid="l/DavidLie">David Lie</author>
<title>Aion Attacks: Manipulating Software Timers in Trusted Execution Environment.</title>
<pages>173-193</pages>
<year>2021</year>
<booktitle>DIMVA</booktitle>
<ee>https://doi.org/10.1007/978-3-030-80825-9_9</ee>
<crossref>conf/dimva/2021</crossref>
<url>db/conf/dimva/dimva2021.html#0027XCL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/YangLP21" mdate="2022-01-31">
<author pid="56/10361">Mingyue Yang</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>Accelerating Symbolic Analysis for Android Apps.</title>
<pages>47-52</pages>
<year>2021</year>
<booktitle>ASE Workshops</booktitle>
<ee>https://doi.org/10.1109/ASEW52652.2021.00021</ee>
<crossref>conf/kbse/2021w</crossref>
<url>db/conf/kbse/ase2021w.html#YangLP21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/CuiZL21" mdate="2021-06-17">
<author pid="165/2824">Rongzhen Cui</author>
<author pid="140/6495">Lianying Zhao</author>
<author pid="l/DavidLie">David Lie</author>
<title>Emilia: Catching Iago in Legacy Code.</title>
<year>2021</year>
<booktitle>NDSS</booktitle>
<ee type="oa">https://www.ndss-symposium.org/ndss-paper/emilia-catching-iago-in-legacy-code/</ee>
<crossref>conf/ndss/2021</crossref>
<url>db/conf/ndss/ndss2021.html#CuiZL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BourtouleCCJTZL21" mdate="2025-07-17">
<author pid="255/4792">Lucas Bourtoule</author>
<author pid="179/2245">Varun Chandrasekaran</author>
<author pid="250/9674">Christopher A. Choquette-Choo</author>
<author pid="255/4934-1">Hengrui Jia 0001</author>
<author pid="255/5127">Adelin Travers</author>
<author pid="191/1478">Baiwu Zhang</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>Machine Unlearning.</title>
<pages>141-159</pages>
<year>2021</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP40001.2021.00019</ee>
<crossref>conf/sp/2021</crossref>
<url>db/conf/sp/sp2021.html#BourtouleCCJTZL21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/CaoXPLTA21" mdate="2021-09-16">
<author pid="301/5889">Weicheng Cao</author>
<author pid="228/8982">Chunqiu Xia</author>
<author pid="91/8283">Sai Teja Peddinti</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="t/NinaTaft">Nina Taft</author>
<author pid="169/3376">Lisa M. Austin</author>
<title>A Large Scale Study of User Behavior, Expectations and Engagement with Android Permissions.</title>
<pages>803-820</pages>
<year>2021</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity21/presentation/cao-weicheng</ee>
<crossref>conf/uss/2021</crossref>
<url>db/conf/uss/uss2021.html#CaoXPLTA21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2108-02010" mdate="2021-08-05">
<author pid="255/5127">Adelin Travers</author>
<author pid="298/7534">Lorna Licollari</author>
<author pid="298/7700">Guanghan Wang</author>
<author pid="179/2245">Varun Chandrasekaran</author>
<author pid="191/0540">Adam Dziedzic</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples.</title>
<year>2021</year>
<volume>abs/2108.02010</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2108.02010</ee>
<url>db/journals/corr/corr2108.html#abs-2108-02010</url>
</article>
</r>
<r><article key="journals/ieeesp/ZhaoL20" mdate="2022-08-16">
<author orcid="0000-0002-6376-4062" pid="140/6495">Lianying Zhao</author>
<author pid="l/DavidLie">David Lie</author>
<title>Is Hardware More Secure Than Software?</title>
<pages>8-17</pages>
<year>2020</year>
<volume>18</volume>
<journal>IEEE Secur. Priv.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MSEC.2020.2994827</ee>
<ee>https://www.wikidata.org/entity/Q113435866</ee>
<url>db/journals/ieeesp/ieeesp18.html#ZhaoL20</url>
</article>
</r>
<r><article key="journals/usenix-login/HuangLTJ20" mdate="2021-01-04">
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="91/6206">Gang Tan</author>
<author pid="45/576">Trent Jaeger</author>
<title>Using Safety Properties to Generate Vulnerability Patches.</title>
<year>2020</year>
<volume>45</volume>
<journal>login Usenix Mag.</journal>
<number>4</number>
<ee>https://www.usenix.org/publications/login/winter2020/huang</ee>
<url>db/journals/usenix-login/usenix-login45.html#HuangLTJ20</url>
</article>
</r>
<r><inproceedings key="conf/sp/PustogarovWL20" mdate="2023-09-21">
<author pid="47/8436">Ivan Pustogarov</author>
<author pid="61/591">Qian Wu</author>
<author pid="l/DavidLie">David Lie</author>
<title>Ex-vivo dynamic analysis framework for Android device drivers.</title>
<pages>1088-1105</pages>
<year>2020</year>
<booktitle>SP</booktitle>
<ee>https://doi.org/10.1109/SP40000.2020.00094</ee>
<crossref>conf/sp/2020</crossref>
<url>db/conf/sp/sp2020.html#PustogarovWL20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2007-15805" mdate="2020-08-03">
<author pid="246/9380">He Shuang</author>
<author pid="182/4674">Michelle Y. Wong</author>
<author pid="l/DavidLie">David Lie</author>
<title>Using Context and Interactions to Verify User-Intended Network Requests.</title>
<year>2020</year>
<volume>abs/2007.15805</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2007.15805</ee>
<url>db/journals/corr/corr2007.html#abs-2007-15805</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2008-02954" mdate="2020-08-14">
<author pid="150/8244">Wenjun Qiu</author>
<author pid="l/DavidLie">David Lie</author>
<title>Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification.</title>
<year>2020</year>
<volume>abs/2008.02954</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2008.02954</ee>
<url>db/journals/corr/corr2008.html#abs-2008-02954</url>
</article>
</r>
<r><inproceedings key="conf/apsys/ShuangHBZPL19" mdate="2020-10-25">
<author pid="246/9380">He Shuang</author>
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="246/9043">Pushkar Bettadpur</author>
<author orcid="0000-0002-6376-4062" pid="140/6495">Lianying Zhao</author>
<author pid="47/8436">Ivan Pustogarov</author>
<author pid="l/DavidLie">David Lie</author>
<title>Using Inputs and Context to Verify User Intentions in Internet Services.</title>
<pages>76-83</pages>
<year>2019</year>
<booktitle>APSys</booktitle>
<ee>https://doi.org/10.1145/3343737.3343739</ee>
<crossref>conf/apsys/2019</crossref>
<url>db/conf/apsys/apsys2019.html#ShuangHBZPL19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/0002LTJ19" mdate="2023-03-21">
<author orcid="0000-0002-7684-8388" pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<author orcid="0000-0001-6109-6091" pid="91/6206">Gang Tan</author>
<author pid="45/576">Trent Jaeger</author>
<title>Using Safety Properties to Generate Vulnerability Patches.</title>
<pages>539-554</pages>
<year>2019</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2019.00071</ee>
<crossref>conf/sp/2019</crossref>
<url>db/conf/sp/sp2019.html#0002LTJ19</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-1903-06889" mdate="2019-04-01">
<author pid="200/7957">Hsuan-Chi Kuo</author>
<author pid="238/0157">Akshith Gunasekaran</author>
<author pid="150/5222">Yeongjin Jang</author>
<author pid="60/5790">Sibin Mohan</author>
<author pid="115/7959">Rakesh B. Bobba</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="22/2341">Jesse Walker</author>
<title>MultiK: A Framework for Orchestrating Multiple Specialized Kernels.</title>
<year>2019</year>
<volume>abs/1903.06889</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1903.06889</ee>
<url>db/journals/corr/corr1903.html#abs-1903-06889</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1910-04957" mdate="2019-12-12">
<author pid="140/6495">Lianying Zhao</author>
<author pid="246/9380">He Shuang</author>
<author pid="69/9079">Shengjie Xu</author>
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="165/2824">Rongzhen Cui</author>
<author pid="246/9043">Pushkar Bettadpur</author>
<author pid="l/DavidLie">David Lie</author>
<title>SoK: Hardware Security Support for Trustworthy Execution.</title>
<year>2019</year>
<volume>abs/1910.04957</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1910.04957</ee>
<url>db/journals/corr/corr1910.html#abs-1910-04957</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1912-03817" mdate="2025-07-17">
<author pid="255/4792">Lucas Bourtoule</author>
<author pid="179/2245">Varun Chandrasekaran</author>
<author pid="250/9674">Christopher A. Choquette-Choo</author>
<author pid="255/4934-1">Hengrui Jia 0001</author>
<author pid="255/5127">Adelin Travers</author>
<author pid="191/1478">Baiwu Zhang</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="162/1405">Nicolas Papernot</author>
<title>Machine Unlearning.</title>
<year>2019</year>
<volume>abs/1912.03817</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1912.03817</ee>
<url>db/journals/corr/corr1912.html#abs-1912-03817</url>
</article>
</r>
<r><inproceedings key="conf/uss/WongL18" mdate="2021-02-01">
<author pid="182/4674">Michelle Y. Wong</author>
<author pid="l/DavidLie">David Lie</author>
<title>Tackling runtime-based obfuscation in Android with TIRO.</title>
<pages>1247-1262</pages>
<year>2018</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">https://www.usenix.org/conference/usenixsecurity18/presentation/wong</ee>
<crossref>conf/uss/2018</crossref>
<url>db/conf/uss/uss2018.html#WongL18</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2018" mdate="2020-11-10">
<editor pid="l/DavidLie">David Lie</editor>
<editor pid="m/MohammadMannan">Mohammad Mannan</editor>
<editor pid="b/MichaelBackes1">Michael Backes 0001</editor>
<editor pid="06/6268">XiaoFeng Wang 0001</editor>
<title>Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018</title>
<publisher>ACM</publisher>
<booktitle>CCS</booktitle>
<year>2018</year>
<isbn>978-1-4503-5693-0</isbn>
<ee>http://dl.acm.org/citation.cfm?id=3243734</ee>
<url>db/conf/ccs/ccs2018.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2018cpsspc" mdate="2020-11-10">
<editor pid="l/DavidLie">David Lie</editor>
<editor pid="m/MohammadMannan">Mohammad Mannan</editor>
<title>Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018</title>
<publisher>ACM</publisher>
<booktitle>CPS-SPC@CCS</booktitle>
<year>2018</year>
<isbn>978-1-4503-5992-4</isbn>
<ee>http://dl.acm.org/citation.cfm?id=3264888</ee>
<url>db/conf/ccs/cpsspc2018.html</url>
</proceedings>
</r>
<r><proceedings key="conf/wpes/2018" mdate="2021-07-28">
<editor pid="l/DavidLie">David Lie</editor>
<editor pid="m/MohammadMannan">Mohammad Mannan</editor>
<editor pid="24/3059-1">Aaron Johnson 0001</editor>
<title>Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018</title>
<publisher>ACM</publisher>
<booktitle>CCS</booktitle>
<year>2018</year>
<isbn>978-1-4503-5989-4</isbn>
<ee>http://dl.acm.org/citation.cfm?id=3267323</ee>
<url>db/conf/wpes/wpes2018.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/hotos/KimOL17" mdate="2024-10-06">
<author orcid="0000-0002-8650-6082" pid="05/10299">Beom Heyn Kim</author>
<author pid="165/6270">Sukwon Oh</author>
<author pid="l/DavidLie">David Lie</author>
<title>Consistency Oracles: Towards an Interactive and Flexible Consistency Model Specification.</title>
<pages>82-87</pages>
<year>2017</year>
<booktitle>HotOS</booktitle>
<ee>https://doi.org/10.1145/3102980.3102994</ee>
<crossref>conf/hotos/2017</crossref>
<url>db/conf/hotos/hotos2017.html#KimOL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotos/LieM17" mdate="2018-11-06">
<author pid="l/DavidLie">David Lie</author>
<author pid="m/PetrosManiatis">Petros Maniatis</author>
<title>Glimmers: Resolving the Privacy/Trust Quagmire.</title>
<pages>94-99</pages>
<year>2017</year>
<booktitle>HotOS</booktitle>
<ee>https://doi.org/10.1145/3102980.3102996</ee>
<crossref>conf/hotos/2017</crossref>
<url>db/conf/hotos/hotos2017.html#LieM17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sosp/BittauEMMRLRKTS17" mdate="2024-10-06">
<author pid="70/1811">Andrea Bittau</author>
<author pid="e/UErlingsson">&#218;lfar Erlingsson</author>
<author pid="m/PetrosManiatis">Petros Maniatis</author>
<author orcid="0000-0002-2149-1916" pid="19/5860">Ilya Mironov</author>
<author pid="15/7563">Ananth Raghunathan</author>
<author pid="l/DavidLie">David Lie</author>
<author orcid="0009-0001-8492-2621" pid="22/3541">Mitch Rudominer</author>
<author pid="207/1863">Ushasree Kode</author>
<author pid="14/6329">Julien Tinn&#233;s</author>
<author pid="207/1861">Bernhard Seefeld</author>
<title>Prochlo: Strong Privacy for Analytics in the Crowd.</title>
<pages>441-459</pages>
<year>2017</year>
<booktitle>SOSP</booktitle>
<ee>https://doi.org/10.1145/3132747.3132769</ee>
<crossref>conf/sosp/2017</crossref>
<url>db/conf/sosp/sosp2017.html#BittauEMMRLRKTS17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/LieM17" mdate="2018-08-13">
<author pid="l/DavidLie">David Lie</author>
<author pid="m/PetrosManiatis">Petros Maniatis</author>
<title>Glimmers: Resolving the Privacy/Trust Quagmire.</title>
<year>2017</year>
<volume>abs/1702.07436</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1702.07436</ee>
<url>db/journals/corr/corr1702.html#LieM17</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-00901" mdate="2019-09-27">
<author pid="70/1811">Andrea Bittau</author>
<author pid="e/UErlingsson">&#218;lfar Erlingsson</author>
<author pid="m/PetrosManiatis">Petros Maniatis</author>
<author pid="19/5860">Ilya Mironov</author>
<author pid="15/7563">Ananth Raghunathan</author>
<author pid="l/DavidLie">David Lie</author>
<author pid="22/3541">Mitch Rudominer</author>
<author pid="207/1863">Ushasree Kode</author>
<author pid="14/6329">Julien Tinn&#233;s</author>
<author pid="207/1861">Bernhard Seefeld</author>
<title>Prochlo: Strong Privacy for Analytics in the Crowd.</title>
<year>2017</year>
<volume>abs/1710.00901</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.00901</ee>
<url>db/journals/corr/corr1710.html#abs-1710-00901</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-03789" mdate="2018-08-13">
<author pid="05/10299">Beom Heyn Kim</author>
<author pid="59/2063">Eyal de Lara</author>
<author pid="l/DavidLie">David Lie</author>
<title>The Case for a Single System Image for Personal Devices.</title>
<year>2017</year>
<volume>abs/1710.03789</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.03789</ee>
<url>db/journals/corr/corr1710.html#abs-1710-03789</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1710-03861" mdate="2019-12-12">
<author pid="05/10299">Beom Heyn Kim</author>
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="96/10298">Afshar Ganjali</author>
<author pid="l/DavidLie">David Lie</author>
<title>Unity 2.0: Secure and Durable Personal Cloud Storage.</title>
<year>2017</year>
<volume>abs/1710.03861</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1710.03861</ee>
<url>db/journals/corr/corr1710.html#abs-1710-03861</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-00795" mdate="2018-08-13">
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="184/6385">Mariana D'Angelo</author>
<author pid="184/5986">Dhaval Miyani</author>
<author pid="l/DavidLie">David Lie</author>
<title>Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.</title>
<year>2017</year>
<volume>abs/1711.00795</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.00795</ee>
<url>db/journals/corr/corr1711.html#abs-1711-00795</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-00830" mdate="2018-08-13">
<author pid="184/5986">Dhaval Miyani</author>
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<title>BinPro: A Tool for Binary Source Code Provenance.</title>
<year>2017</year>
<volume>abs/1711.00830</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.00830</ee>
<url>db/journals/corr/corr1711.html#abs-1711-00830</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-03397" mdate="2018-08-13">
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<title>SAIC: Identifying Configuration Files for System Configuration Management.</title>
<year>2017</year>
<volume>abs/1711.03397</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.03397</ee>
<url>db/journals/corr/corr1711.html#abs-1711-03397</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-04030" mdate="2018-08-13">
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<title>Ocasta: Clustering Configuration Settings For Error Recovery.</title>
<year>2017</year>
<volume>abs/1711.04030</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.04030</ee>
<url>db/journals/corr/corr1711.html#abs-1711-04030</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-1711-11136" mdate="2018-08-13">
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<title>Senx: Sound Patch Generation for Security Vulnerabilities.</title>
<year>2017</year>
<volume>abs/1711.11136</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1711.11136</ee>
<url>db/journals/corr/corr1711.html#abs-1711-11136</url>
</article>
</r>
<r><inproceedings key="conf/acsac/HuangHML16" mdate="2019-12-12">
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="22/3870-2">Zhen Huang 0002</author>
<author pid="184/5986">Dhaval Miyani</author>
<author pid="l/DavidLie">David Lie</author>
<title>LMP: light-weighted memory protection with hardware assistance.</title>
<pages>460-470</pages>
<year>2016</year>
<booktitle>ACSAC</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=2991089</ee>
<crossref>conf/acsac/2016</crossref>
<url>db/conf/acsac/acsac2016.html#HuangHML16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ndss/WongL16" mdate="2018-01-16">
<author pid="182/4674">Michelle Y. Wong</author>
<author pid="l/DavidLie">David Lie</author>
<title>IntelliDroid: A Targeted Input Generator for the Dynamic Analysis of Android Malware.</title>
<year>2016</year>
<booktitle>NDSS</booktitle>
<ee>http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2017/09/intellidroid-targeted-input-generator-dynamic-analysis-android-malware.pdf</ee>
<crossref>conf/ndss/2016</crossref>
<url>db/conf/ndss/ndss2016.html#WongL16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/HuangDML16" mdate="2023-03-24">
<author orcid="0000-0002-7684-8388" pid="22/3870-2">Zhen Huang 0002</author>
<author pid="184/6385">Mariana D'Angelo</author>
<author pid="184/5986">Dhaval Miyani</author>
<author pid="l/DavidLie">David Lie</author>
<title>Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response.</title>
<pages>618-635</pages>
<year>2016</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2016.43</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2016.43</ee>
<crossref>conf/sp/2016</crossref>
<url>db/conf/sp/sp2016.html#HuangDML16</url>
</inproceedings>
</r>
<r><article key="journals/csur/HuangGKOL15" mdate="2025-01-19">
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="96/10298">Afshar Ganjali</author>
<author orcid="0000-0002-8650-6082" pid="05/10299">Beom Heyn Kim</author>
<author pid="165/6270">Sukwon Oh</author>
<author pid="l/DavidLie">David Lie</author>
<title>The State of Public Infrastructure-as-a-Service Cloud Security.</title>
<pages>68:1-68:31</pages>
<year>2015</year>
<volume>47</volume>
<journal>ACM Comput. Surv.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/2767181</ee>
<ee>https://www.wikidata.org/entity/Q131133597</ee>
<url>db/journals/csur/csur47.html#HuangGKOL15</url>
</article>
</r>
<r><inproceedings key="conf/ccs/WursterL15" mdate="2020-11-10">
<author pid="04/319">Glenn Wurster</author>
<author pid="l/DavidLie">David Lie</author>
<title>SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.</title>
<pages>1713-1714</pages>
<year>2015</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2810103.2812625</ee>
<crossref>conf/ccs/2015</crossref>
<url>db/conf/ccs/ccs2015.html#WursterL15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/KimL15" mdate="2024-10-06">
<author orcid="0000-0002-8650-6082" pid="05/10299">Beom Heyn Kim</author>
<author pid="l/DavidLie">David Lie</author>
<title>Caelus: Verifying the Consistency of Cloud Services with Battery-Powered Devices.</title>
<pages>880-896</pages>
<year>2015</year>
<booktitle>IEEE Symposium on Security and Privacy</booktitle>
<ee>https://doi.org/10.1109/SP.2015.59</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.2015.59</ee>
<crossref>conf/sp/2015</crossref>
<url>db/conf/sp/sp2015.html#KimL15</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2015spsm" mdate="2020-11-10">
<editor pid="l/DavidLie">David Lie</editor>
<editor pid="04/319">Glenn Wurster</editor>
<title>Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2015, Denver, Colorado, USA, October 12, 2015</title>
<booktitle>SPSM@CCS</booktitle>
<publisher>ACM</publisher>
<year>2015</year>
<isbn>978-1-4503-3819-6</isbn>
<ee>https://doi.org/10.1145/2808117</ee>
<url>db/conf/ccs/spsm2015.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/ccs/WeiL14" mdate="2025-01-19">
<author pid="181/2906">Zheng Wei</author>
<author pid="l/DavidLie">David Lie</author>
<title>LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes.</title>
<pages>27-38</pages>
<year>2014</year>
<booktitle>SPSM@CCS</booktitle>
<ee>https://doi.org/10.1145/2666620.2666626</ee>
<ee>https://www.wikidata.org/entity/Q131132348</ee>
<crossref>conf/ccs/2014spsm</crossref>
<url>db/conf/ccs/spsm2014.html#WeiL14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dsn/HuangL14" mdate="2023-03-24">
<author orcid="0000-0002-7684-8388" pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<title>Ocasta: Clustering Configuration Settings for Error Recovery.</title>
<pages>479-490</pages>
<year>2014</year>
<booktitle>DSN</booktitle>
<ee>https://doi.org/10.1109/DSN.2014.51</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DSN.2014.51</ee>
<crossref>conf/dsn/2014</crossref>
<url>db/conf/dsn/dsn2014.html#HuangL14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/KimHL12" mdate="2024-10-06">
<author orcid="0000-0002-8650-6082" pid="05/10299">Beom Heyn Kim</author>
<author pid="81/6685-27">Wei Huang 0027</author>
<author pid="l/DavidLie">David Lie</author>
<title>Unity: secure and durable personal cloud storage.</title>
<pages>31-36</pages>
<year>2012</year>
<booktitle>CCSW</booktitle>
<ee>https://doi.org/10.1145/2381913.2381920</ee>
<crossref>conf/ccs/2012ccsw</crossref>
<url>db/conf/ccs/ccsw2012.html#KimHL12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/AuZHL12" mdate="2020-11-10">
<author pid="119/7694">Kathy Wain Yee Au</author>
<author pid="119/7741">Yi Fan Zhou</author>
<author orcid="0000-0002-7684-8388" pid="22/3870-2">Zhen Huang 0002</author>
<author pid="l/DavidLie">David Lie</author>
<title>PScout: analyzing the Android permission specification.</title>
<pages>217-228</pages>
<year>2012</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2382196.2382222</ee>
<crossref>conf/ccs/2012</crossref>
<url>db/conf/ccs/ccs2012.html#AuZHL12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/MannanKGL11" mdate="2024-10-06">
<author pid="m/MohammadMannan">Mohammad Mannan</author>
<author orcid="0000-0002-8650-6082" pid="05/10299">Beom Heyn Kim</author>
<author pid="96/10298">Afshar Ganjali</author>
<author pid="l/DavidLie">David Lie</author>
<title>Unicorn: two-factor attestation for data security.</title>
<pages>17-28</pages>
<year>2011</year>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/2046707.2046712</ee>
<crossref>conf/ccs/2011</crossref>
<url>db/conf/ccs/ccs2011.html#MannanKGL11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/AuZHGL11" mdate="2025-01-19">
<author pid="119/7694">Kathy Wain Yee Au</author>
<author pid="119/7741">Yi Fan Zhou</author>
<author orcid="0000-0002-7684-8388" pid="22/3870-2">Zhen Huang 0002</author>
<author pid="52/2893">Phillipa Gill</author>
<author pid="l/DavidLie">David Lie</author>
<title>Short paper: a look at smartphone permission models.</title>
<pages>63-68</pages>
<year>2011</year>
<booktitle>SPSM@CCS</booktitle>
<ee>https://doi.org/10.1145/2046614.2046626</ee>
<ee>https://www.wikidata.org/entity/Q131123445</ee>
<crossref>conf/ccs/2011spsm</crossref>
<url>db/conf/ccs/spsm2011.html#AuZHGL11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fc/MannanBBLO11" mdate="2020-05-18">
<author pid="m/MohammadMannan">Mohammad Mannan</author>
<author pid="91/7087-3">David Barrera 0003</author>
<author pid="24/10842">Carson D. Brown</author>
<author pid="l/DavidLie">David Lie</author>
<author orcid="0000-0002-5038-5370" pid="o/PCvOorschot">Paul C. van Oorschot</author>
<title>Mercury: Recovering Forgotten Passwords Using Personal Devices.</title>
<pages>315-330</pages>
<year>2011</year>
<booktitle>Financial Cryptography</booktitle>
<ee>https://doi.org/10.1007/978-3-642-27576-0_26</ee>
<crossref>conf/fc/2011</crossref>
<url>db/conf/fc/fc2011.html#MannanBBLO11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vee/LittyL11" mdate="2025-01-19">
<author pid="60/2864">Lionel Litty</author>
<author pid="l/DavidLie">David Lie</author>
<title>Patch auditing in infrastructure as a service clouds.</title>
<pages>145-156</pages>
<year>2011</year>
<booktitle>VEE</booktitle>
<ee>https://doi.org/10.1145/1952682.1952702</ee>
<ee>https://doi.org/10.1145/2007477.1952702</ee>
<ee>https://www.wikidata.org/entity/Q131128747</ee>
<crossref>conf/vee/2011</crossref>
<url>db/conf/vee/vee2011.html#LittyL11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/LieL10" mdate="2017-01-09">
<author pid="l/DavidLie">David Lie</author>
<author pid="60/2864">Lionel Litty</author>
<title>Using hypervisors to secure commodity operating systems.</title>
<pages>11-20</pages>
<year>2010</year>
<booktitle>STC@CCS</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1867639</ee>
<crossref>conf/ccs/2010stc</crossref>
<url>db/conf/ccs/stc2010.html#LieL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/eurosys/ChewL10" mdate="2018-11-06">
<author pid="57/8290">Lee Chew</author>
<author pid="l/DavidLie">David Lie</author>
<title>Kivati: fast detection and prevention of atomicity violations.</title>
<pages>307-320</pages>
<year>2010</year>
<booktitle>EuroSys</booktitle>
<ee>https://doi.org/10.1145/1755913.1755945</ee>
<crossref>conf/eurosys/2010</crossref>
<url>db/conf/eurosys/eurosys2010.html#ChewL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/GillGWL10" mdate="2021-02-07">
<author pid="52/2893">Phillipa Gill</author>
<author pid="36/3795">Yashar Ganjali</author>
<author pid="34/2603-1">Bernard Wong 0001</author>
<author pid="l/DavidLie">David Lie</author>
<title>Dude, Where's That IP? Circumventing Measurement-based IP Geolocation.</title>
<pages>241-256</pages>
<year>2010</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">http://www.usenix.org/events/sec10/tech/full_papers/Gill.pdf</ee>
<crossref>conf/uss/2010</crossref>
<url>db/conf/uss/uss2010.html#GillGWL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotos/LittyLL09" mdate="2020-03-12">
<author pid="60/2864">Lionel Litty</author>
<author pid="11/1308">H. Andr&#233;s Lagar-Cavilla</author>
<author pid="l/DavidLie">David Lie</author>
<title>Computer Meteorology: Monitoring Compute Clouds.</title>
<year>2009</year>
<booktitle>HotOS</booktitle>
<ee type="oa">http://www.usenix.org/events/hotos09/tech/full_papers/litty/litty.pdf</ee>
<crossref>conf/hotos/2009</crossref>
<url>db/conf/hotos/hotos2009.html#LittyLL09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/HartKGCL08" mdate="2023-03-24">
<author pid="06/6741">Thomas E. Hart</author>
<author pid="26/2910">Kelvin Ku</author>
<author pid="44/3532">Arie Gurfinkel</author>
<author pid="c/MarshaChechik">Marsha Chechik</author>
<author pid="l/DavidLie">David Lie</author>
<title>Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates.</title>
<pages>387-390</pages>
<year>2008</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1109/ASE.2008.55</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ASE.2008.55</ee>
<crossref>conf/kbse/2008</crossref>
<url>db/conf/kbse/ase2008.html#HartKGCL08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/HartKGCL08a" mdate="2023-03-24">
<author pid="06/6741">Thomas E. Hart</author>
<author pid="26/2910">Kelvin Ku</author>
<author orcid="0000-0002-5964-6792" pid="44/3532">Arie Gurfinkel</author>
<author pid="c/MarshaChechik">Marsha Chechik</author>
<author pid="l/DavidLie">David Lie</author>
<title>PtYasm: Software Model Checking with Proof Templates.</title>
<pages>479-480</pages>
<year>2008</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1109/ASE.2008.80</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ASE.2008.80</ee>
<crossref>conf/kbse/2008</crossref>
<url>db/conf/kbse/ase2008.html#HartKGCL08a</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/HartCL08" mdate="2020-03-12">
<author pid="06/6741">Thomas E. Hart</author>
<author pid="c/MarshaChechik">Marsha Chechik</author>
<author pid="l/DavidLie">David Lie</author>
<title>Security Benchmarking using Partial Verification.</title>
<year>2008</year>
<booktitle>HotSec</booktitle>
<ee type="oa">http://www.usenix.org/events/hotsec08/tech/full_papers/hart/hart.pdf</ee>
<crossref>conf/uss/2008hotsec</crossref>
<url>db/conf/uss/hotsec2008.html#HartCL08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/LittyLL08" mdate="2020-03-12">
<author pid="60/2864">Lionel Litty</author>
<author pid="11/1308">H. Andr&#233;s Lagar-Cavilla</author>
<author pid="l/DavidLie">David Lie</author>
<title>Hypervisor Support for Identifying Covertly Executing Binaries.</title>
<pages>243-258</pages>
<year>2008</year>
<booktitle>USENIX Security Symposium</booktitle>
<ee type="oa">http://www.usenix.org/events/sec08/tech/full_papers/litty/litty.pdf</ee>
<crossref>conf/uss/2008</crossref>
<url>db/conf/uss/uss2008.html#LittyLL08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hotos/PoolWL07" mdate="2020-03-12">
<author pid="51/8170">Jesse Pool</author>
<author pid="50/8170">Ian Sin Kwok Wong</author>
<author pid="l/DavidLie">David Lie</author>
<title>Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical.</title>
<year>2007</year>
<booktitle>HotOS</booktitle>
<ee type="oa">http://www.usenix.org/events/hotos07/tech/full_papers/pool/pool.pdf</ee>
<crossref>conf/hotos/2007</crossref>
<url>db/conf/hotos/hotos2007.html#PoolWL07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/KuHCL07" mdate="2025-01-19">
<author pid="26/2910">Kelvin Ku</author>
<author pid="06/6741">Thomas E. Hart</author>
<author pid="c/MarshaChechik">Marsha Chechik</author>
<author pid="l/DavidLie">David Lie</author>
<title>A buffer overflow benchmark for software model checkers.</title>
<pages>389-392</pages>
<year>2007</year>
<crossref>conf/kbse/2007</crossref>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1145/1321631.1321691</ee>
<ee>https://www.wikidata.org/entity/Q131113291</ee>
<url>db/conf/kbse/ase2007.html#KuHCL07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uss/LieS07" mdate="2021-02-01">
<author pid="l/DavidLie">David Lie</author>
<author pid="s/MahadevSatyanarayanan">Mahadev Satyanarayanan</author>
<title>Quantifying the Strength of Security Systems.</title>
<year>2007</year>
<crossref>conf/uss/2007hotsec</crossref>
<booktitle>HotSec</booktitle>
<ee type="oa">https://www.usenix.org/conference/hotsec-07/quantifying-strength-security-systems</ee>
<url>db/conf/uss/hotsec2007.html#LieS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asplos/LittyL06" mdate="2018-11-06">
<author pid="60/2864">Lionel Litty</author>
<author pid="l/DavidLie">David Lie</author>
<title>Manitou: a layer-below approach to fighting malware.</title>
<pages>6-11</pages>
<year>2006</year>
<crossref>conf/asplos/2006asid</crossref>
<booktitle>ASID</booktitle>
<ee>https://doi.org/10.1145/1181309.1181311</ee>
<url>db/conf/asplos/asid2006.html#LittyL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/osdi/Ta-MinLL06" mdate="2021-02-02">
<author pid="65/5111">Richard Ta-Min</author>
<author pid="60/2864">Lionel Litty</author>
<author pid="l/DavidLie">David Lie</author>
<title>Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable.</title>
<pages>279-292</pages>
<year>2006</year>
<crossref>conf/osdi/2006</crossref>
<booktitle>OSDI</booktitle>
<ee type="oa">http://www.usenix.org/events/osdi06/tech/ta-min.html</ee>
<url>db/conf/osdi/osdi2006.html#Ta-MinLL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/vee/AsrigoLL06" mdate="2018-11-06">
<author pid="53/5783">Kurniadi Asrigo</author>
<author pid="60/2864">Lionel Litty</author>
<author pid="l/DavidLie">David Lie</author>
<title>Using VMM-based sensors to monitor honeypots.</title>
<pages>13-23</pages>
<year>2006</year>
<crossref>conf/vee/2006</crossref>
<booktitle>VEE</booktitle>
<ee>https://doi.org/10.1145/1134760.1134765</ee>
<url>db/conf/vee/vee2006.html#AsrigoLL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sosp/LieTH03" mdate="2018-11-06">
<author pid="l/DavidLie">David Lie</author>
<author pid="13/3927">Chandramohan A. Thekkath</author>
<author pid="h/MarkHorowitz">Mark Horowitz</author>
<title>Implementing an untrusted operating system on trusted hardware.</title>
<pages>178-192</pages>
<year>2003</year>
<crossref>conf/sosp/2003</crossref>
<booktitle>SOSP</booktitle>
<ee>https://doi.org/10.1145/945445.945463</ee>
<url>db/conf/sosp/sosp2003.html#LieTH03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/LieMTH03" mdate="2023-09-21">
<author pid="l/DavidLie">David Lie</author>
<author pid="m/JohnCMitchell">John C. Mitchell</author>
<author pid="13/3927">Chandramohan A. Thekkath</author>
<author pid="h/MarkHorowitz">Mark Horowitz</author>
<title>Specifying and Verifying Hardware for Tamper-Resistant Software.</title>
<pages>166-</pages>
<year>2003</year>
<crossref>conf/sp/2003</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.2003.1199335</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.2003.1199335</ee>
<url>db/conf/sp/sp2003.html#LieMTH03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isca/LieCED01" mdate="2023-03-24">
<author pid="l/DavidLie">David Lie</author>
<author pid="53/3446">Andy Chou</author>
<author pid="e/DREngler">Dawson R. Engler</author>
<author pid="d/DavidLDill">David L. Dill</author>
<title>A simple method for extracting models for protocol code.</title>
<pages>192-203</pages>
<year>2001</year>
<crossref>conf/isca/2001</crossref>
<booktitle>ISCA</booktitle>
<ee>https://doi.org/10.1145/379240.379263</ee>
<ee>https://doi.org/10.1109/ISCA.2001.937448</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISCA.2001.937448</ee>
<url>db/conf/isca/isca2001.html#LieCED01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/asplos/LieTMLBMH00" mdate="2021-07-07">
<author pid="l/DavidLie">David Lie</author>
<author pid="13/3927">Chandramohan A. Thekkath</author>
<author pid="67/6805">Mark Mitchell</author>
<author pid="l/PatrickLincoln">Patrick Lincoln</author>
<author pid="b/DanBoneh">Dan Boneh</author>
<author pid="m/JohnCMitchell">John C. Mitchell</author>
<author pid="h/MarkHorowitz">Mark Horowitz</author>
<title>Architectural Support for Copy and Tamper Resistant Software.</title>
<pages>168-177</pages>
<year>2000</year>
<crossref>conf/asplos/2000</crossref>
<booktitle>ASPLOS</booktitle>
<ee>https://doi.org/10.1145/378993.379237</ee>
<ee>https://doi.org/10.1145/384264.379237</ee>
<ee>https://doi.org/10.1145/378995.379237</ee>
<ee>https://doi.org/10.1145/356989.357005</ee>
<url>db/conf/asplos/asplos2000.html#LieTMLBMH00</url>
</inproceedings>
</r>
<coauthors n="128" nc="4">
<co c="0"><na f="a/Asrigo:Kurniadi" pid="53/5783">Kurniadi Asrigo</na></co>
<co c="0"><na f="a/Au:Kathy_Wain_Yee" pid="119/7694">Kathy Wain Yee Au</na></co>
<co c="0"><na f="a/Austin:Lisa_M=" pid="169/3376">Lisa M. Austin</na></co>
<co c="0"><na f="b/Backes_0001:Michael" pid="b/MichaelBackes1">Michael Backes 0001</na></co>
<co c="0"><na f="b/Balmau:Oana" pid="157/1134">Oana Balmau</na></co>
<co c="0"><na f="b/Barrera_0003:David" pid="91/7087-3">David Barrera 0003</na></co>
<co c="0"><na f="b/Bettadpur:Pushkar" pid="246/9043">Pushkar Bettadpur</na></co>
<co c="0"><na f="b/Bittau:Andrea" pid="70/1811">Andrea Bittau</na></co>
<co c="0" n="2"><na f="b/Bobba:Rakesh" pid="115/7959">Rakesh Bobba</na><na>Rakesh B. Bobba</na></co>
<co c="0"><na f="b/Boneh:Dan" pid="b/DanBoneh">Dan Boneh</na></co>
<co c="0"><na f="b/Bourtoule:Lucas" pid="255/4792">Lucas Bourtoule</na></co>
<co c="0"><na f="b/Brown:Carson_D=" pid="24/10842">Carson D. Brown</na></co>
<co c="0"><na f="c/Cai:Kunlin" pid="329/3620">Kunlin Cai</na></co>
<co c="0"><na f="c/Cao:Weicheng" pid="301/5889">Weicheng Cao</na></co>
<co c="1"><na f="c/Cento:Greg" pid="365/9408">Greg Cento</na></co>
<co c="0"><na f="c/Chandrasekaran:Varun" pid="179/2245">Varun Chandrasekaran</na></co>
<co c="0"><na f="c/Chechik:Marsha" pid="c/MarshaChechik">Marsha Chechik</na></co>
<co c="2"><na f="c/Chen:Jyh=Cheng" pid="81/797">Jyh-Cheng Chen</na></co>
<co c="0"><na f="c/Cheng:Yueqiang" pid="15/8296">Yueqiang Cheng</na></co>
<co c="-1"><na f="c/Chew:Lee" pid="57/8290">Lee Chew</na></co>
<co c="1"><na f="c/Chignell:Mark_H=" pid="08/2050">Mark H. Chignell</na></co>
<co c="0"><na f="c/Choquette=Choo:Christopher_A=" pid="250/9674">Christopher A. Choquette-Choo</na></co>
<co c="0"><na f="c/Chou:Andy" pid="53/3446">Andy Chou</na></co>
<co c="1"><na f="c/Chung:Mu=Huan" pid="282/3748">Mu-Huan Chung</na></co>
<co c="2"><na f="c/Cortier:V=eacute=ronique" pid="65/550">V&#233;ronique Cortier</na></co>
<co c="0"><na f="c/Cui:Rongzhen" pid="165/2824">Rongzhen Cui</na></co>
<co c="0"><na f="d/Dam:Michelangelo_van" pid="342/3927">Michelangelo van Dam</na></co>
<co c="0"><na f="d/D=Angelo:Mariana" pid="184/6385">Mariana D'Angelo</na></co>
<co c="0"><na f="d/Dill:David_L=" pid="d/DavidLDill">David L. Dill</na></co>
<co c="0"><na f="d/Ding:Guozhen" pid="383/0908">Guozhen Ding</na></co>
<co c="0"><na f="d/Dziedzic:Adam" pid="191/0540">Adam Dziedzic</na></co>
<co c="0"><na f="e/Engler:Dawson_R=" pid="e/DREngler">Dawson R. Engler</na></co>
<co c="0"><na f="e/Erlingsson:=Uacute=lfar" pid="e/UErlingsson">&#218;lfar Erlingsson</na></co>
<co c="0"><na f="g/Ganjali:Afshar" pid="96/10298">Afshar Ganjali</na></co>
<co c="0"><na f="g/Ganjali:Yashar" pid="36/3795">Yashar Ganjali</na></co>
<co c="1"><na f="g/Giang:Calvin" pid="341/5557">Calvin Giang</na></co>
<co c="0"><na f="g/Gill:Phillipa" pid="52/2893">Phillipa Gill</na></co>
<co c="0"><na f="g/Grishchenko:Ilya" pid="180/7263">Ilya Grishchenko</na></co>
<co c="0"><na f="g/Gunasekaran:Akshith" pid="238/0157">Akshith Gunasekaran</na></co>
<co c="0"><na f="g/Guo:Xiangyu" pid="164/9677">Xiangyu Guo</na></co>
<co c="0"><na f="g/Gurfinkel:Arie" pid="44/3532">Arie Gurfinkel</na></co>
<co c="0"><na f="h/Hart:Thomas_E=" pid="06/6741">Thomas E. Hart</na></co>
<co c="0"><na f="h/Horowitz:Mark" pid="h/MarkHorowitz">Mark Horowitz</na></co>
<co c="0"><na f="h/Hu:Xiao" pid="19/1374">Xiao Hu</na></co>
<co c="2"><na f="h/Huang:Chun=Ying" pid="08/3422">Chun-Ying Huang</na></co>
<co c="0"><na f="h/Huang_0027:Wei" pid="81/6685-27">Wei Huang 0027</na></co>
<co c="0"><na f="h/Huang_0002:Zhen" pid="22/3870-2">Zhen Huang 0002</na></co>
<co c="0"><na f="j/Jaeger:Trent" pid="45/576">Trent Jaeger</na></co>
<co c="0"><na f="j/Jang:Yeongjin" pid="150/5222">Yeongjin Jang</na></co>
<co c="1"><na f="j/Jerath:Khilan" pid="341/5891">Khilan Jerath</na></co>
<co c="0"><na f="j/Jia_0001:Hengrui" pid="255/4934-1">Hengrui Jia 0001</na></co>
<co c="0"><na f="j/Johnson_0001:Aaron" pid="24/3059-1">Aaron Johnson 0001</na></co>
<co c="0"><na f="k/Kawlay:Akshay" pid="400/4745">Akshay Kawlay</na></co>
<co c="0"><na f="k/Kim:Beom_Heyn" pid="05/10299">Beom Heyn Kim</na></co>
<co c="0"><na f="k/Kim:Taesoo" pid="38/8882">Taesoo Kim</na></co>
<co c="0"><na f="k/Kirda:Engin" pid="k/EnginKirda">Engin Kirda</na></co>
<co c="0"><na f="k/Kode:Ushasree" pid="207/1863">Ushasree Kode</na></co>
<co c="1"><na f="k/Kongmanee:Jaturong" pid="198/8232">Jaturong Kongmanee</na></co>
<co c="0"><na f="k/Ku:Kelvin" pid="26/2910">Kelvin Ku</na></co>
<co c="0"><na f="k/Kuo:Hsuan=Chi" pid="200/7957">Hsuan-Chi Kuo</na></co>
<co c="0"><na f="l/Lagar=Cavilla:H=_Andr=eacute=s" pid="11/1308">H. Andr&#233;s Lagar-Cavilla</na></co>
<co c="0"><na f="l/Lara:Eyal_de" pid="59/2063">Eyal de Lara</na></co>
<co c="0"><na f="l/Li:Kexin" pid="86/8898">Kexin Li</na></co>
<co c="1"><na f="l/Li:Sharon" pid="341/5700">Sharon Li</na></co>
<co c="0"><na f="l/Li_0095:Ying" pid="22/1805-95">Ying Li 0095</na></co>
<co c="0"><na f="l/Liao:Xiaojing" pid="129/1113">Xiaojing Liao</na></co>
<co c="0"><na f="l/Licollari:Lorna" pid="298/7534">Lorna Licollari</na></co>
<co c="0"><na f="l/Lincoln:Patrick" pid="l/PatrickLincoln">Patrick Lincoln</na></co>
<co c="0"><na f="l/Litty:Lionel" pid="60/2864">Lionel Litty</na></co>
<co c="0"><na f="l/Liu:Eric" pid="54/6550">Eric Liu</na></co>
<co c="0"><na f="l/Luo:Bo" pid="71/2890">Bo Luo</na></co>
<co c="0"><na f="m/Maniatis:Petros" pid="m/PetrosManiatis">Petros Maniatis</na></co>
<co c="0"><na f="m/Mannan:Mohammad" pid="m/MohammadMannan">Mohammad Mannan</na></co>
<co c="0"><na f="m/Mehta:Aastha" pid="161/0164">Aastha Mehta</na></co>
<co c="0"><na f="m/Mironov:Ilya" pid="19/5860">Ilya Mironov</na></co>
<co c="0"><na f="m/Mishra:Pritish" pid="233/9256">Pritish Mishra</na></co>
<co c="0"><na f="m/Mitchell:John_C=" pid="m/JohnCMitchell">John C. Mitchell</na></co>
<co c="0"><na f="m/Mitchell:Mark" pid="67/6805">Mark Mitchell</na></co>
<co c="0"><na f="m/Miyani:Dhaval" pid="184/5986">Dhaval Miyani</na></co>
<co c="0"><na f="m/Mohan:Sibin" pid="60/5790">Sibin Mohan</na></co>
<co c="0"><na f="o/Oh:Sukwon" pid="165/6270">Sukwon Oh</na></co>
<co c="0"><na f="o/Oorschot:Paul_C=_van" pid="o/PCvOorschot">Paul C. van Oorschot</na></co>
<co c="0"><na f="p/Papernot:Nicolas" pid="162/1405">Nicolas Papernot</na></co>
<co c="0"><na f="p/Peddinti:Sai_Teja" pid="91/8283">Sai Teja Peddinti</na></co>
<co c="3"><na f="p/Pool:Jesse" pid="51/8170">Jesse Pool</na></co>
<co c="0"><na f="p/Pustogarov:Ivan" pid="47/8436">Ivan Pustogarov</na></co>
<co c="0"><na f="q/Qiu:Wenjun" pid="150/8244">Wenjun Qiu</na></co>
<co c="0"><na f="r/Raghunathan:Ananth" pid="15/7563">Ananth Raghunathan</na></co>
<co c="1"><na f="r/Raman:Abhay" pid="282/3590">Abhay Raman</na></co>
<co c="0"><na f="r/Rudominer:Mitch" pid="22/3541">Mitch Rudominer</na></co>
<co c="0"><na f="s/Saileshwar:Gururaj" pid="196/6747">Gururaj Saileshwar</na></co>
<co c="0"><na f="s/Satyanarayanan:Mahadev" pid="s/MahadevSatyanarayanan">Mahadev Satyanarayanan</na></co>
<co c="0"><na f="s/Schuster:Roei" pid="180/8190">Roei Schuster</na></co>
<co c="0"><na f="s/Seefeld:Bernhard" pid="207/1861">Bernhard Seefeld</na></co>
<co c="0"><na f="s/Shezan:Faysal_Hossain" pid="180/3862">Faysal Hossain Shezan</na></co>
<co c="2"><na f="s/Shieh:Shiuh=Pyng" pid="s/ShiuhPyngShieh">Shiuh-Pyng Shieh</na></co>
<co c="0"><na f="s/Shuang:He" pid="246/9380">He Shuang</na></co>
<co c="0"><na f="s/Shumailov:Ilia" pid="213/8587">Ilia Shumailov</na></co>
<co c="0"><na f="t/Ta=Min:Richard" pid="65/5111">Richard Ta-Min</na></co>
<co c="0"><na f="t/Taft:Nina" pid="t/NinaTaft">Nina Taft</na></co>
<co c="0"><na f="t/Tan:Gang" pid="91/6206">Gang Tan</na></co>
<co c="0"><na f="t/Thekkath:Chandramohan_A=" pid="13/3927">Chandramohan A. Thekkath</na></co>
<co c="0"><na f="t/Tian_0001:Yuan" pid="39/5423-1">Yuan Tian 0001</na></co>
<co c="0"><na f="t/Tinn=eacute=s:Julien" pid="14/6329">Julien Tinn&#233;s</na></co>
<co c="0"><na f="t/Travers:Adelin" pid="255/5127">Adelin Travers</na></co>
<co c="0"><na f="w/Walker:Jesse" pid="22/2341">Jesse Walker</na></co>
<co c="0"><na f="w/Wang:Guanghan" pid="298/7700">Guanghan Wang</na></co>
<co c="0"><na f="w/Wang:Jiaqi" pid="44/740">Jiaqi Wang</na></co>
<co c="1"><na f="w/Wang_0004:Lu" pid="49/3800-4">Lu Wang 0004</na></co>
<co c="0"><na f="w/Wang:Weizhou" pid="41/8593">Weizhou Wang</na></co>
<co c="0"><na f="w/Wang_0001:XiaoFeng" pid="06/6268">XiaoFeng Wang 0001</na></co>
<co c="-1"><na f="w/Wei:Zheng" pid="181/2906">Zheng Wei</na></co>
<co c="0"><na f="w/Wong_0001:Bernard" pid="34/2603-1">Bernard Wong 0001</na></co>
<co c="3"><na f="w/Wong:Ian_Sin_Kwok" pid="50/8170">Ian Sin Kwok Wong</na></co>
<co c="0"><na f="w/Wong:Michelle_Y=" pid="182/4674">Michelle Y. Wong</na></co>
<co c="0"><na f="w/Wu:Qian" pid="61/591">Qian Wu</na></co>
<co c="0"><na f="w/Wurster:Glenn" pid="04/319">Glenn Wurster</na></co>
<co c="0"><na f="x/Xi:Yang" pid="217/8793">Yang Xi</na></co>
<co c="0"><na f="x/Xia:Chunqiu" pid="228/8982">Chunqiu Xia</na></co>
<co c="0"><na f="x/Xu_0024:Jun" pid="90/514-24">Jun Xu 0024</na></co>
<co c="0"><na f="x/Xu:Shengjie" pid="69/9079">Shengjie Xu</na></co>
<co c="0"><na f="y/Yan:Yuqin" pid="373/3644">Yuqin Yan</na></co>
<co c="0"><na f="y/Yang:Mingyue" pid="56/10361">Mingyue Yang</na></co>
<co c="1"><na f="y/Yang_0007:Yuhong" pid="52/5811-7">Yuhong Yang 0007</na></co>
<co c="0"><na f="z/Zhang:Baiwu" pid="191/1478">Baiwu Zhang</na></co>
<co c="0"><na f="z/Zhang:Tianchen" pid="190/6812">Tianchen Zhang</na></co>
<co c="0"><na f="z/Zhao:Lianying" pid="140/6495">Lianying Zhao</na></co>
<co c="0"><na f="z/Zhou:Yi_Fan" pid="119/7741">Yi Fan Zhou</na></co>
</coauthors>
</dblpperson>

