{Graphene-SGX}: A practical library {OS} for unmodified applications on {SGX} CC Tsai, DE Porter, M Vij 2017 USENIX Annual Technical Conference (USENIX ATC 17), 645-658, 2017 | 650 | 2017 |
Cooperation and security isolation of library OSes for multi-process applications CC Tsai, KS Arora, N Bandi, B Jain, W Jannen, J John, HA Kalodner, ... Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 203* | 2014 |
Stable deterministic multithreading through schedule memoization H Cui 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 152 | 2010 |
An {Off-Chip} attack on hardware enclaves via the memory bus D Lee, D Jung, IT Fang, CC Tsai, RA Popa 29th USENIX Security Symposium (USENIX Security 20), 2020 | 87 | 2020 |
A study of modern linux api usage and compatibility: What to support when you're supporting CC Tsai, B Jain, NA Abdul, DE Porter Proceedings of the Eleventh European Conference on Computer Systems, 1-16, 2016 | 85 | 2016 |
Civet: An efficient java partitioning framework for hardware enclaves CC Tsai, J Son, B Jain, J McAvey, RA Popa, DE Porter 29th USENIX Security Symposium (USENIX Security 20), 505-522, 2020 | 47 | 2020 |
How to get more value from your file system directory cache CC Tsai, Y Zhan, J Reddy, Y Jiao, T Zhang, DE Porter Proceedings of the 25th Symposium on Operating Systems Principles, 441-456, 2015 | 43 | 2015 |
Pervasive detection of process races in deployed systems O Laadan, N Viennot, CC Tsai, C Blinn, J Yang, J Nieh Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011 | 41 | 2011 |
X86-64 instruction usage among c/c++ applications A Akshintala, B Jain, CC Tsai, M Ferdman, DE Porter Proceedings of the 12th ACM International Conference on Systems and Storage …, 2019 | 26 | 2019 |
When threads meet events: efficient and precise static race detection with origins B Liu, P Liu, Y Li, CC Tsai, D Da Silva, J Huang Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021 | 22 | 2021 |
Revice: Reusing victim cache to prevent speculative cache leakage S Kim, F Mahmud, J Huang, P Majumder, N Christou, A Muzahid, CC Tsai, ... 2020 IEEE Secure Development (SecDev), 96-107, 2020 | 22 | 2020 |
Practical techniques to obviate setuid-to-root binaries B Jain, CC Tsai, J John, DE Porter Proceedings of the Ninth European Conference on Computer Systems, 1-14, 2014 | 14 | 2014 |
The endokernel: Fast, secure, and programmable subprocess virtualization B Im, F Yang, CC Tsai, M LeMay, A Vahldiek-Oberwagner, N Dautenhahn arXiv preprint arXiv:2108.03705, 2021 | 11 | 2021 |
Virtualize storage, not disks W Jannen, CC Tsai, DE Porter 14th Workshop on Hot Topics in Operating Systems (HotOS XIV), 2013 | 7 | 2013 |
Finding Concurrency Errors in Sequential {Code—OS-level}, In-vivo Model Checking of Process Races O Laadan, CC Tsai, N Viennot, C Blinn, PS Du, J Nieh 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), 2011 | 7 | 2011 |
{ObliCheck}: Efficient Verification of Oblivious Algorithms with Unobservable State J Son, G Prechter, R Poddar, RA Popa, K Sen 30th USENIX Security Symposium (USENIX Security 21), 2021 | 5 | 2021 |
CCS'17 Tutorial Abstract/SGX Security and Privacy T Kim, Z Lin, C Tsai Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 5 | 2017 |
A Library Operating System for Compatibility CC Tsai State University of New York at Stony Brook, 2017 | 4 | 2017 |
WHISTLE: CPU Abstractions for Hardware and Software Memory Safety Invariants S Kim, F Mahmud, J Huang, P Majumder, CC Tsai, A Muzahid, EJ Kim IEEE Transactions on Computers 72 (3), 811-825, 2022 | 2 | 2022 |
A clairvoyant approach to evaluating software (in) security B Jain, CC Tsai, DE Porter Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 62-68, 2017 | 2 | 2017 |