@inproceedings{AuZHGL11, title = {Short paper: a look at smartphone permission models}, author = {Kathy Wain Yee Au and Yi Fan Zhou and Zhen Huang and Phillipa Gill and David Lie}, year = {2011}, doi = {10.1145/2046614.2046626}, url = {http://doi.acm.org/10.1145/2046614.2046626}, researchr = {https://researchr.org/publication/AuZHGL11}, cites = {0}, citedby = {0}, pages = {63-68}, booktitle = {SPSM'11, Proceedings of the 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2011, October 17, 2011, Chicago, IL, USA}, editor = {Xuxian Jiang and Amiya Bhattacharya and Partha Dasgupta and William Enck}, publisher = {ACM}, isbn = {978-1-4503-1000-0}, } @inproceedings{HuangHML16, title = {LMP: light-weighted memory protection with hardware assistance}, author = {Wei Huang and Zhen Huang and Dhaval Miyani and David Lie}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991089}, researchr = {https://researchr.org/publication/HuangHML16}, cites = {0}, citedby = {0}, pages = {460-470}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, publisher = {ACM}, isbn = {978-1-4503-4771-6}, } @inproceedings{HuangL14-24, title = {Ocasta: Clustering Configuration Settings for Error Recovery}, author = {Zhen Huang and David Lie}, year = {2014}, doi = {10.1109/DSN.2014.51}, url = {http://dx.doi.org/10.1109/DSN.2014.51}, researchr = {https://researchr.org/publication/HuangL14-24}, cites = {0}, citedby = {0}, pages = {479-490}, booktitle = {44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014}, publisher = {IEEE}, } @inproceedings{HuangDML16, title = {Talos: Neutralizing Vulnerabilities with Security Workarounds for Rapid Response}, author = {Zhen Huang and Mariana DAngelo and Dhaval Miyani and David Lie}, year = {2016}, doi = {10.1109/SP.2016.43}, url = {http://doi.ieeecomputersociety.org/10.1109/SP.2016.43}, researchr = {https://researchr.org/publication/HuangDML16}, cites = {0}, citedby = {0}, pages = {618-635}, booktitle = {IEEE Symposium on Security and Privacy, SP 2016, San Jose, CA, USA, May 22-26, 2016}, publisher = {IEEE}, isbn = {978-1-5090-0824-7}, } @inproceedings{AuZHL12, title = {PScout: analyzing the Android permission specification}, author = {Kathy Wain Yee Au and Yi Fan Zhou and Zhen Huang and David Lie}, year = {2012}, doi = {10.1145/2382196.2382222}, url = {http://doi.acm.org/10.1145/2382196.2382222}, researchr = {https://researchr.org/publication/AuZHL12}, cites = {0}, citedby = {0}, pages = {217-228}, booktitle = {the ACM Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, publisher = {ACM}, isbn = {978-1-4503-1651-4}, }