Charting the attack surface of trigger-action IoT platforms

Q Wang, P Datta, W Yang, S Liu, A Bates… - Proceedings of the 2019 …, 2019‏ - dl.acm.org
Internet of Things (IoT) deployments are becoming increasingly automated and vastly more
complex. Facilitated by programming abstractions such as trigger-action rules, end-users …

Plume: Efficient and complete black-box checking of weak isolation levels

S Liu, L Gu, H Wei, D Basin - Proceedings of the ACM on Programming …, 2024‏ - dl.acm.org
Modern databases embrace weak isolation levels to cater for highly available transactions.
However, weak isolation bugs have recently manifested in many production databases. This …

Efficient black-box checking of snapshot isolation in databases

K Huang, S Liu, Z Chen, H Wei, D Basin, H Li… - ar** a reliable distributed system meeting desired performance requirements is a
hard and labor-intensive task. Formal specification and analysis of a system design can …