Follow
Fengwei Zhang
Fengwei Zhang
Associate Professor, Southern University of Science and Technology
Verified email at sustech.edu.cn - Homepage
Title
Cited by
Cited by
Year
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014
2882014
A comparison study of intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
1372018
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
1042015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
1012013
Ninja: Towards Transparent Tracing and Debugging on {ARM}
Z Ning, F Zhang
26th USENIX Security Symposium (USENIX Security 17), 33-49, 2017
702017
SoK: A study of using hardware-assisted isolated execution environments for security
F Zhang, H Zhang
Proceedings of the Hardware and Architectural Support for Security and …, 2016
642016
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
K Sun, J Wang, F Zhang, A Stavrou
592012
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
582014
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma
Computers & Security 97, 101997, 2020
542020
Understanding the security of arm debugging features
Z Ning, F Zhang
2019 IEEE Symposium on Security and Privacy (SP), 602-619, 2019
522019
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics
J Wang, F Zhang, K Sun, A Stavrou
522011
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
J Li, X Tong, F Zhang, J Ma
IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018
492018
Position paper: Challenges towards securing hardware-assisted execution environments
Z Ning, F Zhang, W Shi, W Shi
Proceedings of the Hardware and Architectural Support for Security and …, 2017
442017
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
432015
StrongBox: A GPU TEE on Arm Endpoints
Y Deng, C Wang, S Yu, S Liu, Z Ning, K Leach, J Li, S Yan, Z He, J Cao, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
352022
Metrics for information security vulnerabilities
JA Wang, M Xia, F Zhang
Journal of Applied Global Research 1 (1), 48-58, 2008
352008
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
332018
Happer: Unpacking Android Apps via a Hardware-Assisted Approach
L Xue, H Zhou, X Luo, Y Zhou, Y Shi, G Gu, F Zhang, MH Au
2021 IEEE Symposium on Security and Privacy (SP), 1641-1658, 2021
322021
{SOTER}: Guarding Black-box Inference for General Neural Networks at the Edge
T Shen, J Qi, J Jiang, X Wang, S Wen, X Chen, S Zhao, S Wang, L Chen, ...
2022 USENIX Annual Technical Conference (USENIX ATC 22), 723-738, 2022
302022
Temporal metrics for software vulnerabilities
JA Wang, F Zhang, M Xia
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
302008
The system can't perform the operation now. Try again later.
Articles 1–20