CFIMon: Detecting violation of control flow integrity using performance counters Y Xia, Y Liu, H Chen, B Zang IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012 | 295 | 2012 |
Catalyzer: Sub-millisecond startup for serverless computing with initialization-less booting D Du, T Yu, Y Xia, B Zang, G Yan, C Qin, Q Wu, H Chen Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 249 | 2020 |
Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation Y Liu, T Zhou, K Chen, H Chen, Y Xia Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 195 | 2015 |
Characterizing serverless platforms with serverlessbench T Yu, Q Liu, D Du, Y Xia, B Zang, Z Lu, P Yang, C Qin, H Chen Proceedings of the 11th ACM Symposium on Cloud Computing, 30-44, 2020 | 175 | 2020 |
Shadoweth: Private smart contract on public blockchain R Yuan, YB Xia, HB Chen, BY Zang, J Xie Journal of Computer Science and Technology 33, 542-556, 2018 | 158 | 2018 |
{vTZ}: Virtualizing {ARM}{TrustZone} Z Hua, J Gu, Y Xia, H Chen, B Zang, H Guan 26th USENIX Security Symposium (USENIX Security 17), 541-556, 2017 | 157 | 2017 |
Occlum: Secure and efficient multitasking inside a single enclave of intel sgx Y Shen, H Tian, Y Chen, K Chen, R Wang, Y Xu, Y Xia, S Yan Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 149 | 2020 |
Efficient and available in-memory KV-store with hybrid erasure coding and replication H Chen, H Zhang, M Dong, Z Wang, Y Xia, H Guan, B Zang ACM Transactions on Storage (TOS) 13 (3), 1-30, 2017 | 141 | 2017 |
Adattester: Secure online mobile advertisement attestation using trustzone W Li, H Li, H Chen, Y Xia Proceedings of the 13th annual international conference on mobile systems …, 2015 | 137 | 2015 |
Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks Y Xia, Y Liu, H Chen 2013 IEEE 19th International Symposium on High Performance Computer …, 2013 | 112 | 2013 |
Building trusted path on untrusted device drivers for mobile devices W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014 | 107 | 2014 |
Scalable memory protection in the {PENGLAI} enclave E Feng, X Lu, D Du, B Yang, X Jiang, Y Xia, B Zang, H Chen 15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021 | 72 | 2021 |
Secure live migration of SGX enclaves on untrusted cloud J Gu, Z Hua, Y Xia, H Chen, B Zang, H Guan, J Li 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017 | 70 | 2017 |
Concurrent and consistent virtual machine introspection with hardware transactional memory Y Liu, Y Xia, H Guan, B Zang, H Chen 2014 IEEE 20th international symposium on high performance computer …, 2014 | 67 | 2014 |
Deconstructing Xen. L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li NDSS, 2017 | 66 | 2017 |
{EPTI}: Efficient Defence against Meltdown Attack for Unpatched {VMs} Z Hua, D Du, Y Xia, H Chen, B Zang 2018 USENIX Annual Technical Conference (USENIX ATC 18), 255-266, 2018 | 57 | 2018 |
Defending against VM rollback attack Y Xia, Y Liu, H Chen, B Zang IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012 | 57 | 2012 |
TEEv: Virtualizing trusted execution environments on mobile platforms W Li, Y Xia, L Lu, H Chen, B Zang Proceedings of the 15th ACM SIGPLAN/SIGOPS international conference on …, 2019 | 53 | 2019 |
Serverless computing on heterogeneous computers D Du, Q Liu, X Jiang, Y Xia, B Zang, H Chen Proceedings of the 27th ACM international conference on architectural …, 2022 | 50 | 2022 |
Mitigating sync amplification for copy-on-write virtual disk Q Chen, L Liang, Y Xia, H Chen 14th USENIX Conference on File and Storage Technologies (FAST 16), 241-247, 2016 | 43 | 2016 |