Biblio

Export 11 results:
Filters: Author is Hao Chen  [Clear All Filters]
2021
Yoon M-K, Liu M, Chen H, Kim J-E, Shao Z.  2021.  Blinder: Partition-Oblivious Hierarchical Scheduling. 30th USENIX Security Symposium (USENIX Security 21). :2417--2434.
Chen H, Ruan C, Li C, Ma X, Xu Y.  2021.  SpanDB: A Fast, Cost-Effective LSM-tree Based KV Store on Hybrid Storage. 19th USENIX Conference on File and Storage Technologies (FAST 21). :17--32.
2019
M. Riazi S, Samragh M, Chen H, Laine K, Lauter K, Koushanfar F.  2019.  XONN: XNOR-based Oblivious Deep Neural Network Inference. 28th USENIX Security Symposium (USENIX Security 19). :1501--1518.
2016
Gu R, Shao Z, Chen H, Wu X, Kim J, Sj√∂berg V, Costanzo D.  2016.  CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). :653--669.
Setty S, Su C, Lorch JR, Zhou L, Chen H, Patel P, Ren J.  2016.  Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). :501--516.
Turk A, Chen H, Tuncer O, Li H, Li Q, Krieger O, Coskun AK.  2016.  Seeing into a Public Cloud: Monitoring the Massachusetts Open Cloud. USENIX Workshop on Cool Topics on Sustainable Data Centers (CoolDC 16).
2011
Cai L, Chen H.  2011.  TouchLogger: Inferring Keystrokes on Touch Screen from Smartphone Motion. 6th USENIX Workshop on Hot Topics in Security (HotSec 11).
2010
Davis B, Chen H.  2010.  DBTaint: Cross-Application Information Flow Tracking via Databases. USENIX Conference on Web Application Development (WebApps 10).
2008
Niu Y, Hsu F, Chen H.  2008.  iPhish: Phishing Vulnerabilities on Consumer Electronics. Usability, Psychology, and Security 2008 (UPSEC 08).
2002
Chen H, Wagner D, Dean D.  2002.  Setuid Demystified. 11th USENIX Security Symposium (USENIX Security 02).