Home Research
Research

Research

Edna: Disguising and Revealing User Data in Web Applications (SOSP 2023)

Lillian Tsai, Hannah Gross, Frans Kaashoek, Eddie Kohler, Malte Schwarzkopf

Privacy Heroes Need Data Disguises (HotOS 2021)

Best presentation runner-up
Lillian Tsai, Malte Schwarzkopf, Eddie Kohler

CaSA: End-to-end Quantitative Security Analysis of Randomly Mapped Caches (MICRO 2020)

Intel Hardware Security Academic Award Finalist
Thomas Bourgeat, Jules Drean, Yuheng Yang, Lillian Tsai, Joel Emer, Mengjia Yan

Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers (IEEE S&P 2020)

Lucian Cojocar, Jeremie Kim, Minesh Patel, Lillian Tsai, Stefan Saroiu, Alec Wolman, Onur Mutlu

enClosure: Group Communication via Encounter Closures (MobiSys 2019)

Lillian Tsai, Roberta De Viti, Matthew Lentz, Stefan Saroiu, Bobby Bhattacharjee, Peter Druschel

A Revised and Verified Proof of the Scalable Commutativity Rule (arXiv 2018)

Lillian Tsai, Eddie Kohler, Frans Kaashoek, Nickolai Zeldovich

Concurrent Algorithms in Transactional Data Structures (Harvard Thesis)

Lillian Tsai

Type Aware Transactions for Faster Concurrent Code (Eurosys 2016)

Nathaniel Herman, Jeevana Inala, Yihe Huang, Lillian Tsai, Eddie Kohler, Barbara Liskov, Liuba Shrira

Acknowledgements

In addition to the collaborators above, I owe special thanks to the constant support and mentorship from the following computer scientists:

  • Eddie Kohler (Harvard)
  • Malte Schwarzkopf (Brown)
  • Frans Kaashoek (MIT)
  • Philip Levis (SR@G)
  • Kim Keeton (SR@G)
  • Anastasia Ailamaki (SR@G)
  • Stefan Saroiu (MSR)
  • Peter Druschel (MPI-SWS)
  • Roberta De Viti (MPI-SWS)
  • Matthew Lentz (Duke)
  • Joel Emer (MIT)
  • Margo Seltzer (UBC)