User Tools

Site Tools


yubin_xia

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
yubin_xia [2018/12/26 15:16]
root [Publication]
yubin_xia [2019/06/16 08:44] (current)
root [Professional Services]
Line 20: Line 20:
 ===== Professional Services ===== ===== Professional Services =====
  
-  * 2018 **OSDI**TPC Member +  * 2020MSST 
-  * 2018 **MobiSys**TPC Member +  * 2019MSST, ChinaSys, APSys(LAC), NASAC, HPC-China 
-  * 2017 **SOSP**Local Arrangement Chair +  * 2018OSDI, MobiSys, ​HPC-China 
-  * 2017 **HPC China**: TPC Member +  * 2017: SOSP(LAC), ​AsiaCCS, HPC-China 
-  * 2017 **AsiaCCS**: TPC Member +  * 2016HPC-China 
-  * 2016 **HPC China**: TPC Member +  * 2014: ACA, APSys
-  * 2014 **APSys**TPC Member +
-  * 2014 **ACA**: TPC Member+
  
 ===== Awards and Honors ===== ===== Awards and Honors =====
  
-  * Senior MemberChina Computer Federation (CCF) +  ​* **Best paper award** of VEE, 2019. 
-  * The third prize of “Excellent teacher award” of SJTU, 2016 +  * **Technological Invention Award** of Ministry of Education (the 1st prize, the 4th inventor), 2018. 
-  * Special-class award (the first prize) ​of “Challenge Cup”, 2015 +  * **Senior Member** of China Computer Federation (CCF), 2018. 
-  * Best paper nominee award of HPCA 2014+  * **Excellent teacher award** of SJTU (the 3rd prize), 2016. 
 +  * **Challenge Cup** (special-class awardthe 1st prize), 2015. 
 +  ​* **Best paper nominee award** of HPCA2014.
  
 ===== Projects ===== ===== Projects =====
Line 41: Line 41:
  
   * **Untrusted Hypervisor**:​ Hypervisor, as the critical single point of failure, has bugs. We try to minimize the TCB of hypervisor and tolerant non-critical failures.   * **Untrusted Hypervisor**:​ Hypervisor, as the critical single point of failure, has bugs. We try to minimize the TCB of hypervisor and tolerant non-critical failures.
-    * In HyperCoffer [HPCA'​13] ​pdf, we develop a secure processor that supports unmodified VM running in hardware enclave, without trusting hypervisor. +    * In HyperCoffer [{{:​publications:​hypercoffer-hpca13.pdf|HPCA'​13}}], we develop a secure processor that supports unmodified VM running in hardware enclave, without trusting hypervisor. 
-    * In Nexen [NDSS'​17] ​pdf, we analyze 191 Xen's CVE and redesign Xen by partitioning it to multiple slices. Each slice only serves one VM. The system can defend against 75% vulnerability without knowing details.+    * In Nexen [{{:​publications:​nexen-ndss17.pdf|NDSS'​17}}], we analyze 191 Xen's CVE and redesign Xen by partitioning it to multiple slices. Each slice only serves one VM. The system can defend against 75% of all vulnerabilities.
  
   * **System and Application on ARM TrustZone**:​ We aim to leverage TrustZone to improve the security and performance of different scenarios, on both mobile and server platforms.   * **System and Application on ARM TrustZone**:​ We aim to leverage TrustZone to improve the security and performance of different scenarios, on both mobile and server platforms.
-    * In vTZ [USENIX Security'​17] ​pdf, we build a system that enables system virtualization for ARM server that supports different TrustZone for each VM. +    * In vTZ [{{:​publications:​vtz-security17.pdf|USENIX Security'​17}}], we build a system that enables system virtualization for ARM server that supports different TrustZone for each VM. 
-    * In AdAttester [MobiSys'​15] ​pdf, we leverage TrustZone to prevent Ad fraud by generating attestation of user's behavior in the secure world.+    * In AdAttester [{{:​publications:​adattester-mobisys15.pdf|MobiSys'​15}}], we leverage TrustZone to prevent Ad fraud by generating attestation of user's behavior in the secure world
 +    * In VButton [{{:​publications:​vbutton-mobisys18.pdf|MobiSys'​18}}],​ we further generalize the abstraction to protection any click of user to prevent auto-click and ensure the operation reflects user's intention.
     * The above projects are based on T6, our full-fledged TEE operating system that has been deployed in tens of millions of mobile phones. More info of T6 can be found here: http://​trustkernel.com     * The above projects are based on T6, our full-fledged TEE operating system that has been deployed in tens of millions of mobile phones. More info of T6 can be found here: http://​trustkernel.com
  
   * **System Software Support for Intel SGX**: We try to integrate SGX with system software to achieve better performance,​ compatibility,​ more functionalities and be more developer-friendly.   * **System Software Support for Intel SGX**: We try to integrate SGX with system software to achieve better performance,​ compatibility,​ more functionalities and be more developer-friendly.
-    * In SGX-Migration [DSN'​17] ​pdf, we build virtualization support for SGX enclave which supports live migration without trusting hypervisor or guest operating system. +    * In SGX-Migration [{{:​publications:​sgxmigration-dsn17.pdf|DSN'17}}], we build virtualization support for SGX enclave which supports live migration without trusting hypervisor or guest operating system. 
-    * In SGX-chain, we use SGX to protect the smart contract execution in Ethereum to offer confidentiality for blockchain.+    * In ShadowEth [{{:​publications:​shadoweth-jcst18.pdf|JCST'​18}}], we use SGX to protect the smart contract execution in Ethereum to offer confidentiality for blockchain.
  
-  * **New Hardware Features for System Software**: We leverag ​new hardware features and build systems faster and more secure. We believe small hardware change can benefit big system security improvement. We go deep into hardware design and the interaction between hardware and system software. +  * **New Hardware Features for System Software**: We leverage ​new hardware features and build systems faster and more secure. We believe small hardware change can benefit big system security improvement. We go deep into hardware design and the interaction between hardware and system software. 
-    * In CFIMon [DSN'​12] ​pdf, we are the first to use hardware performance counter (BTS) to enforce CFI at runtime with acceptable performance overhead. +    * In CFIMon [{{:​publications:​cfimon-dsn12.pdf|DSN'12}}], we are the first to use hardware performance counter (BTS) to enforce CFI at runtime with an acceptable performance overhead. 
-    * In TxIntro [HPCA'​14] ​pdf, we leverage hardware transaction memory to (HTM) enhance VM introspection,​ which won the “Best Paper Nominee” award of HPCA'​14. +    * In TxIntro [{{:​publications:​txintro-hpca14.pdf|HPCA'​14}}], we leverage hardware transaction memory to (HTM) enhance VM introspection,​ which won the “Best Paper Nominee” award of HPCA'​14. 
-    * In VPM [SoCC'​16] pdf, we build a system that hybrids DRAM & PM to achieve close performance as full-PM system which keeping ​the whole system crash consistency. +    * In VPM [{{:​publications:​vpm-socc16.pdf|SoCC'​16}}] pdf, we build a system that hybrids DRAM & PM to achieve close performance as full-PM system which keeps the whole system crash consistency. 
-    * In CrossOver [ISCA'​15] pdf, we improve the performance of cross-domain invocation by introducing new hardware instructions.+    * In CrossOver [{{:​publications:​crossover-isca15.pdf|ISCA'​15}}] pdf, we improve the performance of cross-domain invocation by introducing new hardware instructions.
  
-===== Publication ​=====+===== Selected Publications ​=====
  
-  ​* [USENIX ATC] EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs. Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, and Binyu Zang, 2018 USENIX Annual Technical Conference, Boston, MA, USA, July 2018. +[[:​yubin_xia_full_pub|Full publication list]] 
-  * [MobiSys] VButton: Practical Attestation of User-driven Operations in Mobile Apps. Wenhao Li, Shiyu Luo, Zhichuang Sun, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang, and Haibing Guan, The 16th Annual International Conference on Mobile Systems, Applications,​ and Services, Munich, Germany, Jun 2018. + 
-  * [GetMobile] Wenhao Li, Yubin Xia, Haibo ChenRESEARCH ON ARM TRUSTZONE. ACM GetMobile Magazine, ​Volume 22, Issue 3, 2018. +====2019==== 
-  * [JCST] Yutao Liu, Dong Du, Yubin Xia, Haibo Chen, Binyu Zang. SplitPassA Mutually Distrusting Two-party Password ManagerJournal of Computer Science and Technology, JCST, 2018. + 
-  * [JCST] ​Rui Yuan, Yubin Xia, Haibo Chen, Binyu Zang, ShadowEth: Private Smart Contract on Public Blockchain. Journal of Computer Science and Technology, JCST, 2018. +  ​* [**ISCA**] XPC: Architectural Support for Secure and Efficient Cross Process Call. Dong Du, Zhichao Hua, Yubin Xia, Binyu Zang, Haibo Chen. Proceedings of the 46th International Symposium on Computer Architecture (ISCA), 2019. 
-  * [Usenix Security] vTZ: Virtualizing ARM TrustZone. Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang and Haibing Guan. Usenix Security Symposium 2017. Vancouver, Canada, August, 2017. [pdf] +  * [**VEE**] (**Best Paper Award**) TEEv: Virtualizing Trusted Execution Environments on Mobile Platforms. Wenhao Li, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang. Proceedings of ACM SIGPLAN/​SIGOPS International Conference on Virtual Execution Environments (VEE), 2019. 
-  * [ToS] Efficient and Available In-memory KV-Store with Hybrid Erasure Coding and Replication. Haibo Chen, Heng Zhang, Mingkai Dong, Zhaoguo Wang, Yubin Xia, Haibing Guan and Binyu Zang. ACM Transactions on Storage (To appear), 2017. + 
-  ​[DSN] Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming Li, Secure Live Migration of SGX Enclaves on Untrusted Cloud, ​Proceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'​17). Denver, CO, June, 2017. [pdf] +====2018==== 
-  * [NDSS] Lei Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Haibing Guan, Jingming Li. Deconstructing Xen. The Network and Distributed System Security Symposium 2017 (NDSS'​17). San Diego, California. March, 2017. [pdf, slides+ 
-  * [SoCC] Liang Liang, Rong Chen, Haibo Chen, Yubin Xia, Haibing Guan, Binyu Zang, A Case for Virtualizing Persistent Memory, ​ACM Symposium on Cloud Computing 2016 (SoCC'​16),​ Santa Clara, California, October 5-7, 2016. [pdf] +  * [**USENIX ATC**] EPTI: Efficient Defence against Meltdown Attack for Unpatched VMs. Zhichao Hua, Dong Du, Yubin Xia, Haibo Chen, and Binyu Zang, 2018 USENIX Annual Technical Conference, Boston, MA, USA, July 2018. [{{:​publications:​epti-atc18.pdf|paper}}] 
-  * Qingshu Chen, Liang Liang, ​**Yubin Xia**, Haibo Chen, Hyunsoo Kim, **Mitigating Sync Amplification for Copy-on-write Virtual Disk**,The 14th USENIX Conference on File and Storage Technologies (FAST'​16),2016.2.22-2016.2.25. Santa Clara, US, Feb, 2016. +  * [**MobiSys**] VButton: Practical Attestation of User-driven Operations in Mobile Apps. Wenhao Li, Shiyu Luo, Zhichuang Sun, Yubin Xia, Long Lu, Haibo Chen, Binyu Zang, and Haibing Guan, The 16th Annual International Conference on Mobile Systems, Applications,​ and Services, Munich, Germany, Jun 2018. [{{:​publications:​vbutton-mobisys18.pdf|paper}}] 
-  * Yutao Liu, Tianyu Zhou, Kexin Chen, Haibo Chen, **Yubin Xia**, ​**Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation**, Proceedings of the 22th ACM Conference on Computer and Communications Security (**CCS'15**),  Denver, Colorado, US, October, 2015. +  * [**JCST**ShadowEthPrivate Smart Contract on Public Blockchain. Rui Yuan, Yubin Xia, Haibo Chen, Binyu Zang. Journal of Computer Science and Technology, JCST, 2018. [{{:​publications:​shadoweth-jcst18.pdf|paper}}] 
-  * **Yubin Xia**, Yutao Liu, Haibing Guan, Yunji Chen, Tianshi Chen, Binyu Zang, Haibo Chen, Secure Outsourcing of Virtual Appliance, IEEE Transactions on Cloud Computing, PP(99), 2015. + 
-  * Wenhao Li, **Yubin Xia**, Haibo Chen, Binyu Zang, Haibing Guan. **Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls**. In the 42nd International Symposium on Computer Architecture (**ISCA'​15**), 2015. +====2017==== 
-  * Wenhao Li, Haibo Li, Haibo Chen, **Yubin Xia**. ​**AdAttester:​ Secure Online Advertisement Attestation on Mobile Devices Using TrustZone**. In Proceedings of the 13th International Conference on Mobile Systems, Applications,​ and Services (**MobiSys'​15**), 2015. + 
-  * **Yubin Xia**, Yutao Liu, Cheng Tan, Mingyang Ma, Haibing Guan, Binyu Zang, Haibo Chen. **TinMan: Eliminating Confidential Mobile Data Exposure with Security-oriented Offloading**. In Proceedings of the 10th European Conference on Computer Systems (**EuroSys'​15**), 2015. +  * [**Usenix Security**] vTZ: Virtualizing ARM TrustZone. Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang and Haibing Guan. Usenix Security Symposium 2017. Vancouver, Canada, August, 2017. [{{:​publications:​vtz-security17.pdf|paper}}
-  * Hao Zhang, Gang Chen, Beng Chin Ooi, Weng-Fai Wong, Shensen Wu, **Yubin Xia**,​ **"​Anti-Caching"​-based Elastic Memory Management for Big Data**. In Proceedings of the International Conference on Data Engineering (**ICDE'​15**),​ 2015+  * [**DSN**Secure Live Migration of SGX Enclaves on Untrusted Cloud. ​Jinyu Gu, Zhichao Hua, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan, Jinming LiProceedings of the 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'​17). Denver, CO, June, 2017. [{{:​publications:​sgxmigration-dsn17.pdf|paper}}
-  * Wenhao Li, Mingyang Ma, Jinchen Han, **Yubin Xia**, Binyu Zang, Cheng-Kang Chu, Tieyan Li, Feng Bao. **Building Trusted Path on Untrusted Device Drivers for Mobile Devices**. In Proceedings of the 5th Asia-Pacific Workshop on System (APSys'​14), ​2014. +  * [**NDSS**Deconstructing Xen. Lei Shi, Yuming Wu, Yubin Xia, Nathan Dautenhahn, Haibo Chen, Binyu Zang, Haibing Guan, Jingming Li. The Network and Distributed System Security Symposium 2017 (NDSS'​17). San Diego, California. March, 2017. [{{:​publications:​nexen-ndss17.pdf|paper}}] 
-  * Cheng Tan, Haibo Li, **Yubin Xia**, Binyu Zang, Cheng-Kang Chu, Tieyan Li, Feng Bao**PreCrime to the Rescue: Defeating Mobile Malware One Step Ahead**. ​ In Proceedings of the 5th Asia-Pacific Workshop on System (APSys'​14),​ 2014. + 
-  * Yutao Liu, **Yubin Xia**, Haibing Guan, Binyu Zang and Haibo Chen. **Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory**. (Best Paper Nominee) ​In Proceedings of 2014 International Symposium on High Performance Computer Architecture (**HPCA**'14), February, 2014. [{{:​publications:​hpca2014.pdf|pdf}}, {{:​publications:​txintro-slide.zip|slide}}] +====2016==== 
-  * **Yubin Xia**, Yutao Liu and Haibo Chen. **Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks**. In Proceedings of 2013 International Symposium on High Performance Computer Architecture (**HPCA**'13), February, 2013. [{{:​publications:​hc.pdf|pdf}}] + 
-  * **Yubin Xia**, Yutao Liu, Haibo Chen, and Binyu Zang. **CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters**. In Proceeding of Dependable Systems and Networks (**DSN**'12), Boston, US, 2012. [{{:​publications:​cfimon.pdf|pdf}}]+  * [**SoCC**A Case for Virtualizing Persistent Memory. ​Liang Liang, Rong Chen, Haibo Chen, Yubin Xia, Haibing Guan, Binyu ZangACM Symposium on Cloud Computing 2016 (SoCC'​16),​ Santa Clara, California, October 5-7, 2016. [{{:​publications:​vpm-socc16.pdf|paper}}
 +  * [**FAST**Mitigating Sync Amplification for Copy-on-write Virtual Disk. Qingshu Chen, Liang Liang, Yubin Xia, Haibo Chen, Hyunsoo Kim. The 14th USENIX Conference on File and Storage Technologies (FAST'​16),2016.2.22-2016.2.25. Santa Clara, US, Feb, 2016. [{{:​publications:​syncshrink-fast16.pdf|paper}}] 
 + 
 +====2015==== 
 + 
 +  * [**CCS**Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation. Yutao LiuTianyu Zhou, Kexin Chen, Haibo Chen, Yubin Xia. Proceedings of the 22th ACM Conference on Computer and Communications Security (CCS'​15), ​ Denver, Colorado, US, October, 2015. [{{:​publications:​secage-ccs15.pdf|paper}}] 
 +  * [**ISCA**] Reducing World Switches in Virtualized Environment with Flexible Cross-world Calls. Wenhao Li, Yubin Xia, Haibo Chen, Binyu Zang, Haibing Guan. In the 42nd International Symposium on Computer Architecture (ISCA'​15),​ 2015. [{{:​publications:​crossover-isca15.pdf|paper}}] 
 +  * [**MobiSys**AdAttester: Secure Online Advertisement Attestation on Mobile Devices Using TrustZone. Wenhao Li, Haibo Li, Haibo Chen, Yubin Xia. In Proceedings of the 13th International Conference on Mobile Systems, Applications,​ and Services (MobiSys'​15),​ 2015. [{{:​publications:​adattester-mobisys15.pdf|paper}}] 
 +  * [**EuroSys**] TinMan: Eliminating Confidential Mobile Data Exposure with Security-oriented Offloading. Yubin Xia, Yutao Liu, Cheng Tan, Mingyang Ma, Haibing Guan, Binyu Zang, Haibo Chen. In Proceedings of the 10th European Conference on Computer Systems (EuroSys'​15),​ 2015. [{{:​publications:​tinman-eurosys15.pdf|paper}}] 
 + 
 +====2014==== 
 + 
 +  * [**HPCA**] Concurrent and Consistent Virtual Machine Introspection with Hardware Transactional Memory. Yutao Liu, Yubin Xia, Haibing Guan, Binyu Zang and Haibo Chen. In Proceedings of 2014 International Symposium on High Performance Computer Architecture (HPCA'​14),​ February, 2014. (**Best Paper Nominee**)[{{:​publications:​txintro-hpca14.pdf|paper}}, {{:​publications:​txintro-slide.zip|slide}}] 
 + 
 +====2013==== 
 + 
 +  * [**HPCA**Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks. Yubin Xia, Yutao Liu and Haibo Chen. In Proceedings of 2013 International Symposium on High Performance Computer Architecture (HPCA'​13),​ February, 2013. [{{:​publications:​hypercoffer-hpca13.pdf|paper}}] 
 + 
 +====2012==== 
 + 
 +  * [**DSN**CFIMon: Detecting Violation of Control Flow Integrity using Performance Counters. Yubin Xia, Yutao Liu, Haibo Chen, and Binyu Zang. In Proceeding of Dependable Systems and Networks (DSN'​12),​ Boston, US, 2012. [{{:​publications:​cfimon.pdf|paper}}]
  
  
 \\ \\
yubin_xia.1545808600.txt.gz · Last modified: 2018/12/26 15:16 by root