Follow
Yubin Xia
Title
Cited by
Cited by
Year
CFIMon: Detecting violation of control flow integrity using performance counters
Y Xia, Y Liu, H Chen, B Zang
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN …, 2012
3012012
Catalyzer: Sub-millisecond startup for serverless computing with initialization-less booting
D Du, T Yu, Y Xia, B Zang, G Yan, C Qin, Q Wu, H Chen
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
3002020
Characterizing serverless platforms with serverlessbench
T Yu, Q Liu, D Du, Y Xia, B Zang, Z Lu, P Yang, C Qin, H Chen
Proceedings of the 11th ACM Symposium on Cloud Computing, 30-44, 2020
2192020
Thwarting memory disclosure with efficient hypervisor-enforced intra-domain isolation
Y Liu, T Zhou, K Chen, H Chen, Y Xia
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
2112015
Occlum: Secure and efficient multitasking inside a single enclave of intel sgx
Y Shen, H Tian, Y Chen, K Chen, R Wang, Y Xu, Y Xia, S Yan
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
1792020
Shadoweth: Private smart contract on public blockchain
R Yuan, YB Xia, HB Chen, BY Zang, J Xie
Journal of Computer Science and Technology 33, 542-556, 2018
1712018
{vTZ}: Virtualizing {ARM}{TrustZone}
Z Hua, J Gu, Y Xia, H Chen, B Zang, H Guan
26th USENIX Security Symposium (USENIX Security 17), 541-556, 2017
1682017
Efficient and available in-memory KV-store with hybrid erasure coding and replication
H Chen, H Zhang, M Dong, Z Wang, Y Xia, H Guan, B Zang
ACM Transactions on Storage (TOS) 13 (3), 1-30, 2017
1462017
Adattester: Secure online mobile advertisement attestation using trustzone
W Li, H Li, H Chen, Y Xia
Proceedings of the 13th annual international conference on mobile systems …, 2015
1382015
Building trusted path on untrusted device drivers for mobile devices
W Li, M Ma, J Han, Y Xia, B Zang, CK Chu, T Li
Proceedings of 5th Asia-Pacific Workshop on Systems, 1-7, 2014
1132014
Architecture support for guest-transparent vm protection from untrusted hypervisor and physical attacks
Y Xia, Y Liu, H Chen
2013 IEEE 19th International Symposium on High Performance Computer …, 2013
1132013
Scalable memory protection in the {PENGLAI} enclave
E Feng, X Lu, D Du, B Yang, X Jiang, Y Xia, B Zang, H Chen
15th {USENIX} Symposium on Operating Systems Design and Implementation …, 2021
892021
Deconstructing Xen.
L Shi, Y Wu, Y Xia, N Dautenhahn, H Chen, B Zang, J Li
NDSS, 2017
762017
Secure live migration of SGX enclaves on untrusted cloud
J Gu, Z Hua, Y Xia, H Chen, B Zang, H Guan, J Li
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems …, 2017
722017
Serverless computing on heterogeneous computers
D Du, Q Liu, X Jiang, Y Xia, B Zang, H Chen
Proceedings of the 27th ACM international conference on architectural …, 2022
692022
Concurrent and consistent virtual machine introspection with hardware transactional memory
Y Liu, Y Xia, H Guan, B Zang, H Chen
2014 IEEE 20th international symposium on high performance computer …, 2014
692014
{EPTI}: Efficient Defence against Meltdown Attack for Unpatched {VMs}
Z Hua, D Du, Y Xia, H Chen, B Zang
2018 USENIX Annual Technical Conference (USENIX ATC 18), 255-266, 2018
622018
TEEv: Virtualizing trusted execution environments on mobile platforms
W Li, Y Xia, L Lu, H Chen, B Zang
Proceedings of the 15th ACM SIGPLAN/SIGOPS international conference on …, 2019
582019
Defending against VM rollback attack
Y Xia, Y Liu, H Chen, B Zang
IEEE/IFIP International Conference on Dependable Systems and Networks …, 2012
582012
Research on arm trustzone
W Li, Y Xia, H Chen
GetMobile: Mobile Computing and Communications 22 (3), 17-22, 2019
482019
The system can't perform the operation now. Try again later.
Articles 1–20