Xueyang Wang
Xueyang Wang
Intel Corporation
Verified email at nyu.edu
Title
Cited by
Cited by
Year
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
1842016
Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters
X Wang, R Karri
2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-7, 2013
862013
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015
662015
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-flow Modifying Rootkits
X Wang, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2016
482016
Hardware performance counter-based malware identification and detection with adaptive compressive sensing
X Wang, S Chai, M Isnardi, S Lim, R Karri
ACM Transactions on Architecture and Code Optimization (TACO) 13 (1), 1-23, 2016
322016
BRAIN: BehavioR based Adaptive Intrusion detection in Networks: Using Hardware Performance Counters to detect DDoS Attacks
V Jyothi, X Wang, SK Addepalli, R Karri
The 29th International Conference on VLSI Design, 2016
322016
Magic: Malicious aging in circuits/cores
N Karimi, AK Kanuparthi, X Wang, O Sinanoglu, R Karri
ACM Transactions on Architecture and Code Optimization (TACO) 12 (1), 1-25, 2015
292015
Malicious firmware detection with hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ...
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016
262016
SIGDROP: Signature-based ROP detection using hardware performance counters
X Wang, J Backer
arXiv preprint arXiv:1609.02667, 2016
102016
Detecting kernel control-flow modifying Rootkits
X Wang, R Karri
Network Science and Cybersecurity, 177-187, 2014
62014
Numchecker: A System Approach for Kernel Rootkit Detection
X Wang, X Guo
Black Hat Asia 2016, 2016
42016
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
22011
The Industrial Control Systems Cyber Security Landscape
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
1
Reusing Hardware Performance Counters for System Security
X Wang
http://search.proquest.com/docview/1776488413, 2016
2016
ConFirm
X Wang, C Konstantinou, M Maniatakos, R Karri
2015
The system can't perform the operation now. Try again later.
Articles 1–15