Chia-Che Tsai
Cited by
Cited by
Graphene-SGX: A Practical Library OS for Unmodified Applications on SGX.
CC Tsai, DE Porter, M Vij
USENIX Annual Technical Conference, 645-658, 2017
Cooperation and security isolation of library OSes for multi-process applications
CC Tsai, KS Arora, N Bandi, B Jain, W Jannen, J John, HA Kalodner, ...
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
Stable Deterministic Multithreading through Schedule Memoization.
H Cui, J Wu, CC Tsai, J Yang
OSDI 10, 1-13, 2010
A study of modern linux api usage and compatibility: What to support when you're supporting
CC Tsai, B Jain, NA Abdul, DE Porter
Proceedings of the Eleventh European Conference on Computer Systems, 1-16, 2016
An off-chip attack on hardware enclaves via the memory bus
D Lee, D Jung, IT Fang, CC Tsai, RA Popa
Proceedings of the 29th USENIX Conference on Security Symposium, 487-504, 2020
Pervasive detection of process races in deployed systems
O Laadan, N Viennot, CC Tsai, C Blinn, J Yang, J Nieh
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
How to get more value from your file system directory cache
CC Tsai, Y Zhan, J Reddy, Y Jiao, T Zhang, DE Porter
Proceedings of the 25th Symposium on Operating Systems Principles, 441-456, 2015
Civet: An efficient java partitioning framework for hardware enclaves
CC Tsai, J Son, B Jain, RA Popa, DE Porter
Proceedings of the 29th USENIX Security Symposium (USENIX Security'20), 2020
Practical techniques to obviate setuid-to-root binaries
B Jain, CC Tsai, J John, DE Porter
Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014
X86-64 instruction usage among c/c++ applications
A Akshintala, B Jain, CC Tsai, M Ferdman, DE Porter
Proceedings of the 12th ACM International Conference on Systems and Storage …, 2019
Revice: Reusing victim cache to prevent speculative cache leakage
S Kim, F Mahmud, J Huang, P Majumder, N Christou, A Muzahid, CC Tsai, ...
2020 IEEE Secure Development (SecDev), 96-107, 2020
The endokernel: Fast, secure, and programmable subprocess virtualization
B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn
arXiv preprint arXiv:2108.03705, 2021
Virtualize Storage, Not Disks.
W Jannen, CC Tsai, DE Porter
HotOS, 2013
Finding Concurrency Errors in Sequential Code-OS-level, In-vivo Model Checking of Process Races.
O Laadan, CC Tsai, N Viennot, C Blinn, PS Du, J Nieh
HotOS, 2011
When threads meet events: efficient and precise static race detection with origins
B Liu, P Liu, Y Li, CC Tsai, D Da Silva, J Huang
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
CCS'17 Tutorial Abstract/SGX Security and Privacy
T Kim, Z Lin, C Tsai
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
A Library Operating System for Compatibility
CC Tsai
State University of New York at Stony Brook, 2017
C Tsai, D Porter, M Vij
URL: https://www. cs. unc. edu/~ porter/pubs/graphene-sgx. pdf (cit. on p. 4), 0
ObliCheck: Efficient Verification of Oblivious Algorithms with Unobservable State.
J Son, G Prechter, R Poddar, RA Popa, K Sen, CC Tsai, B Jain, J McAvey, ...
USENIX Security Symposium, 2219-2236, 2021
A clairvoyant approach to evaluating software (in) security
B Jain, CC Tsai, DE Porter
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 62-68, 2017
The system can't perform the operation now. Try again later.
Articles 1–20