项目


Leveraging Intel Processor Trace for Control Flow Integrity
Attacking Android Auto System using Man-in-the-middle Approach
Leveraging Intel VMFunc for Secret Protection and Memory Disclosure Attacks Prevention
A System Aiming at Protecting Confidential Data on Mobile Devices
Leveraging Hardware Transactional Memory for Virtual Machine Introspection
Applying Two-man Rule for Authentication of Mobile Applications
Passive reader writer lock
Efficient and Available In-memory KV-Store with Hybrid Erasure Coding and Replication
Fast and Concurrent Query Processing on Big (Linked) Data
Efficient In-memory Transactional Processing Using HTM
Computation and Communication Efficient Graph Processing with Distributed Immutable View
A NUMA-aware Graph-structured Analytics Framework
Differentiated Computation and Partitioning on Skewed Graphs
Adaptive Prediction and Mode Switch on Graph-parallel Computation
A Transparent Service Component-based Decoupling Approach for Mobile Security
Architecture Support for Guest-Transparent VM Protection from Untrusted Hypervisor and Physical Attacks
Detecting Violation of Control Flow Integrity using Performance Counters
Replication-based Fault-tolerance for Large-scale Graph Processing
Confidentiality and High-Assurance equipped Operating Systems
Combining Performance with Dependability Using Self-virtualization
A POwerful Live Updating System
Live Updating Contemporary Operating Systems
VMM-based Process Shepherding
ICA
Safe Binary Device Driver Reuse via User-level Binary Translation
Optimizing Crash Dump in Virtualized Environments
A comprehensive study on software hang
Scalable and Portable Parallel Emulation using Sequential Emulator
Parallelizing Live Migration of Virtual Machines