2008 |
12 | EE | Thomas E. Hart,
Kelvin Ku,
Arie Gurfinkel,
Marsha Chechik,
David Lie:
Augmenting Counterexample-Guided Abstraction Refinement with Proof Templates.
ASE 2008: 387-390 |
11 | EE | Thomas E. Hart,
Kelvin Ku,
Arie Gurfinkel,
Marsha Chechik,
David Lie:
PtYasm: Software Model Checking with Proof Templates.
ASE 2008: 479-480 |
10 | EE | Thomas E. Hart,
Marsha Chechik,
David Lie:
Security Benchmarking using Partial Verification.
HotSec 2008 |
9 | EE | Lionel Litty,
H. Andrés Lagar-Cavilla,
David Lie:
Hypervisor Support for Identifying Covertly Executing Binaries.
USENIX Security Symposium 2008: 243-258 |
2007 |
8 | EE | Kelvin Ku,
Thomas E. Hart,
Marsha Chechik,
David Lie:
A buffer overflow benchmark for software model checkers.
ASE 2007: 389-392 |
2006 |
7 | EE | Lionel Litty,
David Lie:
Manitou: a layer-below approach to fighting malware.
ASID 2006: 6-11 |
6 | EE | Richard Ta-Min,
Lionel Litty,
David Lie:
Splitting Interfaces: Making Trust Between Applications and Operating Systems Configurable.
OSDI 2006: 279-292 |
5 | EE | Kurniadi Asrigo,
Lionel Litty,
David Lie:
Using VMM-based sensors to monitor honeypots.
VEE 2006: 13-23 |
2003 |
4 | EE | David Lie,
John C. Mitchell,
Chandramohan A. Thekkath,
Mark Horowitz:
Specifying and Verifying Hardware for Tamper-Resistant Software.
IEEE Symposium on Security and Privacy 2003: 166- |
3 | EE | David Lie,
Chandramohan A. Thekkath,
Mark Horowitz:
Implementing an untrusted operating system on trusted hardware.
SOSP 2003: 178-192 |
2001 |
2 | EE | David Lie,
Andy Chou,
Dawson R. Engler,
David L. Dill:
A simple method for extracting models for protocol code.
ISCA 2001: 192-203 |
2000 |
1 | EE | David Lie,
Chandramohan A. Thekkath,
Mark Mitchell,
Patrick Lincoln,
Dan Boneh,
John C. Mitchell,
Mark Horowitz:
Architectural Support for Copy and Tamper Resistant Software.
ASPLOS 2000: 168-177 |