Παρακολούθηση
Zhe Wang (王喆)
Zhe Wang (王喆)
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα ict.ac.cn - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Reranz: A light-weight virtual machine to mitigate memory disclosure attacks
Z Wang, C Wu, J Li, Y Lai, X Zhang, WC Hsu, Y Cheng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
382017
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, S Nepal, Y Gao, K Li, ...
2022 USENIX Annual Technical Conference (USENIX ATC 22), 399-414, 2022
252022
Seimi: Efficient and secure smap-enabled intra-process memory isolation
Z Wang, C Wu, M Xie, Y Zhang, K Lu, X Zhang, Y Lai, Y Kang, M Yang
2020 IEEE Symposium on Security and Privacy (SP), 592-607, 2020
252020
Safehidden: an efficient and secure information hiding technique using re-randomization
Z Wang, C Wu, Y Zhang, B Tang, PC Yew, M Xie, Y Lai, Y Kang, Y Cheng, ...
Proceedings of the 28th USENIX Security Symposium (Security'19), 1239-1256, 2019
192019
HSPT: Practical implementation and efficient management of embedded shadow page tables for cross-ISA system virtual machines
Z Wang, J Li, C Wu, D Yang, Z Wang, WC Hsu, B Li, Y Guan
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015
182015
Slime: Program-sensitive energy allocation for fuzzing
C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han, Y Li, Z Wang, W Wang, ...
Proceedings of the 31st ACM SIGSOFT international symposium on software …, 2022
132022
Cetis: Retrofitting intel cet for generic and efficient intra-process memory isolation
M Xie, C Wu, Y Zhang, J Xu, Y Lai, Y Kang, W Wang, Z Wang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
82022
Ferry:{State-Aware} symbolic execution for exploring {State-Dependent} program paths
S Zhou, Z Yang, D Qiao, P Liu, M Yang, Z Wang, C Wu
31st USENIX Security Symposium (USENIX Security 22), 4365-4382, 2022
72022
Making Information Hiding Effective Again
Z Wang, C Wu, Y Zhang, B Tang, PC Yew, M Xie, Y Lai, Y Kang, Y Cheng, ...
IEEE Transactions on Dependable and Secure Computing (TDSC), 2021
62021
Khaos: The impact of inter-procedural code obfuscation on binary diffing techniques
P Zhang, C Wu, M Peng, K Zeng, D Yu, Y Lai, Y Kang, W Wang, Z Wang
Proceedings of the 21st ACM/IEEE International Symposium on Code Generation …, 2023
42023
Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware
C Wu, M Xie, Z Wang, Y Zhang, K Lu, X Zhang, Y Lai, Y Kang, M Yang, ...
IEEE Transactions on Dependable and Secure Computing, 2022
32022
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks
B Tang, C Wu, Z Wang, L Jia, PC Yew, Y Cheng, Y Zhang, C Wang, ...
IEEE Transactions on Dependable and Secure Computing 20 (1), 827-840, 2022
22022
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines
L Sun, C Wu, Z Wang, Y Kang, B Tang
2022 IEEE 46th Annual Computers, Software, and Applications Conference …, 2022
12022
Using local clocks to reproduce concurrency bugs
Z Wang, C Wu, X Yuan, Z Wang, J Li, PC Yew, J Huang, X Feng, Y Lan, ...
IEEE Transactions on Software Engineering 44 (11), 1112-1128, 2017
12017
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–14