Timothy Tsai
Timothy Tsai
Verified email at byu.net
Cited by
Cited by
Fault injection techniques and tools
MC Hsueh, TK Tsai, RK Iyer
Computer 30 (4), 75-82, 1997
Transparent run-time defense against stack-smashing attacks.
A Baratloo, N Singh, TK Tsai
USENIX Annual Technical Conference, General Track, 251-262, 2000
Understanding error propagation in deep learning neural network (DNN) accelerators and applications
G Li, SKS Hari, M Sullivan, T Tsai, K Pattabiraman, J Emer, SW Keckler
Proceedings of the International Conference for High Performance Computing …, 2017
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
YS Wu, S Bagchi, S Garg, N Singh, T Tsai
Dependable Systems and Networks, 2004 International Conference on, 433-442, 2004
An approach towards benchmarking of fault-tolerant commercial systems
TK Tsai, RK Iyer, D Jewitt
Proceedings of Annual Symposium on Fault Tolerant Computing, 314-323, 1996
Method and apparatus for providing extensible object-oriented fault injection
N Singh, T Tsai
US Patent 6,484,276, 2002
Measuring fault tolerance with the FTAPE fault injection tool
TK Tsai, RK Iyer
International Conference on Modelling Techniques and Tools for Computer …, 1995
Distributed indirect software instrumentation
R Klemm, N Singh, T Tsai
US Patent 6,216,237, 2001
Sassifi: An architecture-level fault injection tool for gpu application resilience evaluation
SKS Hari, T Tsai, M Stephenson, SW Keckler, J Emer
2017 IEEE International Symposium on Performance Analysis of Systems and …, 2017
Security vulnerability monitor
N Singh, T Tsai
US Patent App. 10/611,264, 2005
Libsafe: Protecting critical elements of stacks
A Baratloo, N Singh, T Tsai
White Paper http://www. research. avayalabs. com/project/libsafe, 1999
Fault tolerance software system with periodic external self-test failure detection
N Singh, T Tsai
US Patent 7,096,388, 2006
Stress-based and path-based fault injection
TK Tsai, MC Hsueh, H Zhao, Z Kalbarczyk, RK Iyer
IEEE Transactions on Computers 48 (11), 1183-1201, 1999
Libsafe 2.0: Detection of format string vulnerability exploits
T Tsai, N Singh
white paper, Avaya Labs, 2001
Low-overhead run-time memory leak detection and recovery
T Tsai, K Vaidyanathan, K Gross
2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC …, 2006
Fault tolerance via N-modular software redundancy using indirect instrumentation
T Tsai
US Patent 6,161,196, 2000
Modeling soft-error propagation in programs
G Li, K Pattabiraman, SKS Hari, M Sullivan, T Tsai
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Libsafe: Transparent system-wide protection against buffer overflow attacks
T Tsai, N Singh
Proceedings International Conference on Dependable Systems and Networks, 541-541, 2002
Method for understanding and testing third party software components
JM Haddox, GM Kapfhammer, R Colyer, T Tsai
US Patent 7,539,978, 2009
Method for real-time transport protocol (RTP) packet authentication
S Garg, N Singh, TK Tsai
US Patent 7,372,856, 2008
The system can't perform the operation now. Try again later.
Articles 1–20