Armlock: Hardware-based fault isolation for arm Y Zhou, X Wang, Y Chen, Z Wang Proceedings of the 2014 ACM SIGSAC conference on computer and communications ¡¦, 2014 | 93 | 2014 |
SecPod: a Framework for Virtualization-based Security Systems. X Wang, Y Chen, Z Wang, Y Qi, Y Zhou USENIX annual technical conference, 347-360, 2015 | 71 | 2015 |
Design and implementation of SecPod, a framework for virtualization-based security systems X Wang, Y Qi, Z Wang, Y Chen, Y Zhou IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017 | 47 | 2017 |
Appsec: A safe execution environment for security sensitive applications J Ren, Y Qi, Y Dai, X Wang, Y Shi Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on ¡¦, 2015 | 30 | 2015 |
A lightweight VMM on many core for high performance computing Y Dai, Y Qi, J Ren, Y Shi, X Wang, X Yu Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on ¡¦, 2013 | 17 | 2013 |
A Framework for Software Diversification with ISA Heterogeneity. X Wang, SM Yeoh, R Lyerly, P Olivier, SH Kim, B Ravindran RAID, 427-442, 2020 | 15 | 2020 |
Secure and efficient in-process monitor (and library) protection with intel mpk X Wang, SM Yeoh, P Olivier, B Ravindran Proceedings of the 13th European workshop on Systems Security, 7-12, 2020 | 13 | 2020 |
Protecting outsourced data privacy with lifelong policy carrying X Wang, Q Yong, Y Dai, J Ren, Z Hang 2013 IEEE 10th International Conference on High Performance Computing and ¡¦, 2013 | 7 | 2013 |
Dynamic and secure memory transformation in userspace R Lyerly, X Wang, B Ravindran Computer Security–ESORICS 2020: 25th European Symposium on Research in ¡¦, 2020 | 5 | 2020 |
TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud. X Wang, Y Qi, Y Dai, Y Shi, J Ren, X Yu J. Comput. 9 (10), 2303-2314, 2014 | 5 | 2014 |
Transparent privacy protection based on virtual machine monitor ìòËï宝£¬ 齐鸣¬ ÓãêÅ华£¬ èÝ晓Î㬠à¾éÔ£¬ ÞÈ椸 Journal of Software 26 (8), 2124-2137, 2015 | 3 | 2015 |
A Low Overhead and Reliable Nested Virtualization VMM for Cloud Computing X Yu, Q Yong, Y Dai, J Ren, X Wang, S Yi 2013 10th Web Information System and Application Conference, 400-405, 2013 | 2 | 2013 |
Transparent security-sensitive process protection via vmm-based process shadowing X Wang, Y Qi, Y Dai, J Ren 2013 IEEE 37th Annual Computer Software and Applications Conference ¡¦, 2013 | 2 | 2013 |
Trochilidae: Light weight and high performance virtual machine monitor for many-core DAI Yuehua, QI Yong, REN Jianbao, W Xiaoguang, SHI Yi, X Yu Journal of Frontiers of Computer Science & Technology 6 (12), 1126, 2012 | 2 | 2012 |
A Framework to Secure Applications with ISA Heterogeneity X Wang, SM Yeoh, R Lyerly, SH Kim, B Ravindran The 9th Workshop on Systems for Multi-core and Heterogeneous Architectures ¡¦, 2019 | 1 | 2019 |
SecretSafe: a lightweight approach against Heap Buffer Over-Read Attack X Wang, Y Qi, C Zhang, S Qi, P Wang 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC ¡¦, 2017 | 1 | 2017 |
Secure the commodity applications against address exposure attacks X Wang, Y Qi 2017 IEEE Symposium on Computers and Communications (ISCC), 450-456, 2017 | 1 | 2017 |
ÐñéÍ虚拟Ïõ监ÍóÐïîÜ隐Þç÷âÙ¥ÜÁ护 ìòËï宝£¬ 齐鸣¬ ÓãêÅ华£¬ èÝ晓Î㬠à¾éÔ£¬ ÞÈ椸 软Ëì学报 26 (8), 2124-2137, 2015 | 1 | 2015 |
PriVisor: A Method for User Privacy Protection in Untrusted Operating System REN Jianbao, QI Yong, DAI Yuehua, W Xiaoguang, X Yu, G Chen, SHI Yi Journal of Frontiers of Computer Science & Technology 7 (5), 412, 2013 | 1 | 2013 |
Isolate secure executing environment for a safe cloud Y Dai, X Wang, Y Shi, J Ren, Y Qi 2012 1st IEEE International Conference on Communications in China (ICCC), 79-84, 2012 | 1 | 2012 |