Chia-Che Tsai
Cited by
Cited by
{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX}
CC Tsai, DE Porter, M Vij
2017 USENIX Annual Technical Conference (USENIX ATC 17), 645-658, 2017
Cooperation and security isolation of library OSes for multi-process applications
CC Tsai, KS Arora, N Bandi, B Jain, W Jannen, J John, HA Kalodner, ...
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
Stable deterministic multithreading through schedule memoization
H Cui
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
A study of modern linux api usage and compatibility: What to support when you're supporting
CC Tsai, B Jain, NA Abdul, DE Porter
Proceedings of the Eleventh European Conference on Computer Systems, 1-16, 2016
An {Off-Chip} attack on hardware enclaves via the memory bus
D Lee, D Jung, IT Fang, CC Tsai, RA Popa
29th USENIX Security Symposium (USENIX Security 20), 2020
Civet: An efficient java partitioning framework for hardware enclaves
CC Tsai, J Son, B Jain, J McAvey, RA Popa, DE Porter
29th USENIX Security Symposium (USENIX Security 20), 505-522, 2020
How to get more value from your file system directory cache
CC Tsai, Y Zhan, J Reddy, Y Jiao, T Zhang, DE Porter
Proceedings of the 25th Symposium on Operating Systems Principles, 441-456, 2015
Pervasive detection of process races in deployed systems
O Laadan, N Viennot, CC Tsai, C Blinn, J Yang, J Nieh
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
X86-64 instruction usage among c/c++ applications
A Akshintala, B Jain, CC Tsai, M Ferdman, DE Porter
Proceedings of the 12th ACM International Conference on Systems and Storage …, 2019
Revice: Reusing victim cache to prevent speculative cache leakage
S Kim, F Mahmud, J Huang, P Majumder, N Christou, A Muzahid, CC Tsai, ...
2020 IEEE Secure Development (SecDev), 96-107, 2020
When threads meet events: efficient and precise static race detection with origins
B Liu, P Liu, Y Li, CC Tsai, D Da Silva, J Huang
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
Practical techniques to obviate setuid-to-root binaries
B Jain, CC Tsai, J John, DE Porter
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
The endokernel: Fast, secure, and programmable subprocess virtualization
B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn
arXiv preprint arXiv:2108.03705, 2021
Virtualize storage, not disks
W Jannen, CC Tsai, DE Porter
14th Workshop on Hot Topics in Operating Systems (HotOS XIV), 2013
Finding Concurrency Errors in Sequential {Code—OS-level}, In-vivo Model Checking of Process Races
O Laadan, CC Tsai, N Viennot, C Blinn, PS Du, J Nieh
13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011
{ObliCheck}: Efficient Verification of Oblivious Algorithms with Unobservable State
J Son, G Prechter, R Poddar, RA Popa, K Sen
30th USENIX Security Symposium (USENIX Security 21), 2021
CCS'17 Tutorial Abstract/SGX Security and Privacy
T Kim, Z Lin, C Tsai
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
A Library Operating System for Compatibility
CC Tsai
State University of New York at Stony Brook, 2017
A clairvoyant approach to evaluating software (in) security
B Jain, CC Tsai, DE Porter
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 62-68, 2017
C Tsai, D Porter, M Vij
URL: https://www. cs. unc. edu/~ porter/pubs/graphene-sgx. pdf (cit. on p. 4), 0
The system can't perform the operation now. Try again later.
Articles 1–20