Follow
Wenjie Xiong
Title
Cited by
Cited by
Year
Run-time accessible DRAM PUFs in commodity devices
W Xiong, A Schaller, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
International Conference on Cryptographic Hardware and Embedded Systems, 432-453, 2016
702016
A parylene self-locking cuff electrode for peripheral nerve stimulation and recording
H Yu, W Xiong, H Zhang, W Wang, Z Li
Journal of Microelectromechanical Systems 23 (5), 1025-1035, 2014
522014
Intrinsic rowhammer PUFs: Leveraging the rowhammer effect for improved security
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
472017
Decay-based DRAM PUFs in commodity devices
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
IEEE Transactions on Dependable and Secure Computing 16 (3), 462-475, 2018
402018
Leaking information through cache LRU states
W Xiong, J Szefer
2020 IEEE International Symposium on High Performance Computer Architecture …, 2020
322020
Secure tlbs
S Deng, W Xiong, J Szefer
2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture …, 2019
222019
Fingerprinting cloud FPGA infrastructures
S Tian, W Xiong, I Giechaskiel, K Rasmussen, J Szefer
Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020
192020
Ultrahigh-Q, largely deformed microcavities coupled by a free-space laser beam
L Shao, L Wang, W Xiong, XF Jiang, QF Yang, YF Xiao
Applied Physics Letters 103 (12), 121102, 2013
182013
Cache timing side-channel vulnerability checking with computation tree logic
S Deng, W Xiong, J Szefer
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
172018
Analysis of secure caches using a three-step model for timing-based attacks
S Deng, W Xiong, J Szefer
Journal of Hardware and Systems Security 3 (4), 397-425, 2019
152019
Survey of transient execution attacks and their mitigations
W Xiong, J Szefer
ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021
142021
Survey of transient execution attacks
W Xiong, J Szefer
arXiv preprint arXiv:2005.13435, 2020
142020
Survey of Approaches for Security Verification of Hardware/Software Systems.
O Demir, W Xiong, F Zaghloul, J Szefer
IACR Cryptol. ePrint Arch. 2016, 846, 2016
132016
Spying on Temperature using DRAM
W Xiong, NA Anagnostopoulos, A Schaller, S Katzenbeisser, J Szefer
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 13-18, 2019
102019
Intrinsic run-time row hammer PUFs: Leveraging the row hammer effect for run-time cryptography and improved security
NA Anagnostopoulos, T Arul, Y Fan, C Hatzfeld, A Schaller, W Xiong, ...
Cryptography 2 (3), 13, 2018
102018
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks
S Deng, W Xiong, J Szefer
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
92020
SecChisel framework for security verification of secure processor architectures
S Deng, D Gümüşoğlu, W Xiong, S Sari, YS Gener, C Lu, O Demir, ...
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
92019
Thermal covert channels leveraging package-on-package DRAM
S Chen, W Xiong, Y Xu, B Li, J Szefer
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
82019
A cable-tie-type parylene cuff electrode for peripheral nerve interfaces
H Yu, W Xiong, H Zhang, W Wang, Z Li
2014 IEEE 27th International Conference on Micro Electro Mechanical Systems …, 2014
82014
SecChisel: language and tool for practical and scalable security verification of security-aware hardware architectures
S Deng, D Gümüşoğlu, W Xiong, YS Gener, O Demir, J Szefer
Cryptology ePrint Archive, 2017
72017
The system can't perform the operation now. Try again later.
Articles 1–20