Publications
Conferences
- Faulty cloud service can mount the consistency attack by tampering the timing and ordering of operations. We devised a real-time consistency verification system that is timely and battery friendly even without a direct trusted communication channel.
- Unicorn shows how to use Trusted Computing techniques to enable secure computing environment on PC involving two-factor authentication with widely available smart phone devices.
Workshop
- Weak Consistency Models are becoming more and more popular. However, because they are underspecified, both developers of the systems and applications cannot agree on correct consistency behaviors. We propose Consistency Oracles as a more pragmetic instantiation of formal specifications to solve this problem.
- Unity is a personal cloud storage system that untrusts the Cloud. The coordination server is on the Cloud but data is only on the user's devices. Unity frees user's data durability and security from the 3rd party service provider.
Journal
- Comprehensive survey on IaaS Cloud Security and the response of academic research to emerging security concerns in IaaS.
Thesis
- Virtual Disk can be replicated in a hybrid way of mixing eager push-based replication and lazy on-demand fetch replication, and this allows keeping the consistency of Virtual Disk even with instantaneous device switching causing VM migration.