What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tzi-cker Chiueh
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2021
conf/dsn
Keynote I: Advances in memory state-preserving fault tolerance.
Tzi-cker Chiueh
2013
conf/dsn
SIDE: Isolated and efficient execution of unmodified device drivers.
Yifeng Sun
Tzi-cker Chiueh
2011
conf/ccs
Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing.
Zhiyong Shan
Xin Wang
Tzi-cker Chiueh
2011
conf/fc
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems.
Jennia Hizver
Tzi-cker Chiueh
2011
conf/acsac
Tracking payment card data flow using virtual machine state introspection.
Jennia Hizver
Tzi-cker Chiueh
2009
conf/ccs
Large-scale malware indexing using function-call graphs.
Xin Hu
Tzi-cker Chiueh
Kang G. Shin
2009
conf/dsn
Fast memory state synchronization for virtualization-based fault tolerance.
Maohua Lu
Tzi-cker Chiueh
2008
conf/acsac
Execution Trace-Driven Automated Attack Signature Generation.
Susanta Nanda
Tzi-cker Chiueh
2007
conf/ndss
RICH: Automatically Protecting Against Integer-Based Vulnerabilities.
David Brumley
Dawn Xiaodong Song
Tzi-cker Chiueh
Rob Johnson
Huijia Lin
2007
conf/dsn
Portable and Efficient Continuous Data Protection for Network File Servers.
Ningning Zhu
Tzi-cker Chiueh
2007
conf/acsac
Automated Format String Attack Prevention for Win32/X86 Binaries.
Wei Li
Tzi-cker Chiueh
2006
conf/dsn
Accurate and Automated System Call Policy-Based Intrusion Prevention.
Lap-Chung Lam
Wei Li
Tzi-cker Chiueh
2006
conf/acsac
How to Automatically and Accurately Sandbox Microsoft IIS.
Wei Li
Lap-Chung Lam
Tzi-cker Chiueh
2006
conf/acsac
A General Dynamic Information Flow Tracking Framework for Security Applications.
Lap-Chung Lam
Tzi-cker Chiueh
2006
conf/acsac
Foreign Code Detection on the Windows/X86 Platform.
Susanta Nanda
Wei Li
Lap-Chung Lam
Tzi-cker Chiueh
2005
conf/ndss
DIRA: Automatic Detection, Identification and Repair of Control-Hijacking Attacks.
Alexey Smirnov
Tzi-cker Chiueh
2005
conf/dsn
Scalable and Robust WLAN Connectivity Using Access Point Array.
Fanglu Guo
Tzi-cker Chiueh
2005
conf/dsn
Checking Array Bound Violation Using Segmentation Hardware.
Lap-Chung Lam
Tzi-cker Chiueh
2005
conf/acsac
Automated and Safe Vulnerability Assessment.
Fanglu Guo
Yang Yu
Tzi-cker Chiueh
2004
conf/dsn
A Portable Implementation Framework for Intrusion-Resilient Database Management Systems.
Alexey Smirnov
Tzi-cker Chiueh
2004
conf/acsac
Tracing the Root of "Rootable" Processes.
Amit Purohit
Vishnu Navda
Tzi-cker Chiueh
2004
conf/acsac
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security.
Fu-Hau Hsu
Tzi-cker Chiueh
2004
conf/acsac
Design, Implementation, and Evaluation of A Repairable Database Management System.
Tzi-cker Chiueh
Dhruv Pilania
2003
conf/dsn
Design, Implementation, and Evaluation of Repairable File Service.
Ningning Zhu
Tzi-cker Chiueh
2003
conf/dsn
Duplex: A Reusable Fault Tolerance Extension Framework for Network Access Devices.
Srikant Sharma
Jiawu Chen
Wei Li
Kartik Gopalan
Tzi-cker Chiueh
2002
conf/dsn
Track-Based Disk Logging.
Tzi-cker Chiueh
Lan Huang
Coauthors
Alexey Smirnov
(2)
Amit Purohit
(1)
David Brumley
(1)
Dawn Xiaodong Song
(1)
Dhruv Pilania
(1)
Fanglu Guo
(2)
Fu-Hau Hsu
(1)
Huijia Lin
(1)
Jennia Hizver
(2)
Jiawu Chen
(1)
Kang G. Shin
(1)
Kartik Gopalan
(1)
Lan Huang
(1)
Lap-Chung Lam
(5)
Maohua Lu
(1)
Ningning Zhu
(2)
Rob Johnson
(1)
Srikant Sharma
(1)
Susanta Nanda
(2)
Tzi-cker Chiueh
(26)
Vishnu Navda
(1)
Wei Li
(5)
Xin Hu
(1)
Xin Wang
(1)
Yang Yu
(1)
Yifeng Sun
(1)
Zhiyong Shan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to