VTrust: Regaining Trust on Virtual Calls C Zhang, S Carr, T Li, Y Ding, C Song, M Payer, D Song The Network and Distributed System Security Symposium (NDSS'16) 2016, 2016 | 95 | 2016 |
Towards Memory Safe Enclave Programming with Rust-SGX H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2333 ¡¦, 2019 | 61 | 2019 |
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks Y Ding, T Wei, TL Wang, Z Liang, W Zou Proceedings of the 26th Annual Computer Security Applications Conference ¡¦, 2010 | 59 | 2010 |
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications ¡¦, 2017 | 33 | 2017 |
Android Low Entropy Demystified Y Ding, Z Peng, Y Zhou, C Zhang IEEE International Conference on Communications (ICC), 2014 | 18 | 2014 |
A framework to eliminate backdoors from response-computable authentication S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou 2012 IEEE Symposium on Security and Privacy, 3-17, 2012 | 15 | 2012 |
Accurate and Efficient Exploit Capture and Classification Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han SCIENCE CHINA Information Sciences 60 (5), 2017 | 9 | 2017 |
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing Proceedings of the ACM/IEEE 42nd International Conference on Software ¡¦, 2020 | 8 | 2020 |
Poster: AdHoneyDroid: Capture Malicious Android Advertisements D Wang, S Dai, Y Ding, T Li, X Han 21st ACM Conference on Computer and Communications Security (Poster), 2014 | 5 | 2014 |
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree T Li, T Li, Y Ding, Y Zhang, T Wei, X Han Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019 | 3 | 2019 |
Poster: Classifying Downloaders Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han IEEE Symposium on Security and Privacy, 2015 | 3* | 2015 |
ÐñéÍÚÂÊïí®Ý¬îÜSQLñ¼ìýÍô击ÛÁåÙÛ°Ûö H Zhang, Y Ding, L Zhang, L Duan, C Zhang, T Wei, G Li, X Han Journal of Computer Research and Development 53 (10), 2262-2276, 2016 | 2* | 2016 |
SQL Injection Attack Defense Method Based on Sensitive Characters [J] Z Huilin, D Yu, Z Lihua Computer Research and Development 53 (10), 2262-2276, 2016 | 2 | 2016 |
Secure multiparty computing framework using a restricted operating environment with a guest agent Y Cheng, Y Zhang, Y Ding, T Wei US Patent 11,159,322, 2021 | 1 | 2021 |
Towards Memory Safe Python Enclave for Security Sensitive Computation H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding arXiv preprint arXiv:2005.05996, 2020 | 1 | 2020 |
Token based secure multiparty computing framework using a restricted operating environment Y Cheng, Y Zhang, Y Ding, T Wei US Patent 11,128,617, 2021 | | 2021 |
Generic verification approach for Protobuf based projects Q Feng, Y Zhang, P Wang, Y Ding, T Wei US Patent 10,732,944, 2020 | | 2020 |
Method, apparatus and system for device identification Y Ding, T Wei, Y Zhang US Patent 10,341,093, 2019 | | 2019 |
ÐñéÍÝÂ̰ݬîÜÎ¥ó×ÊÅÜâÍô击ÛÁåÙÛ°Ûö H Zhang, G Li, Y Ding, L Duan, X Han, J Xiao Beijing Da Xue Xue Bao 54 (2), 320-330, 2018 | | 2018 |
ò¨ÜõøÁ÷»îÜäÌîïשÔ×ÝÂà° ïËé⣬ ÕóÔÕãô£¬ 韦韬 ñé国教ëÀ网络, 46-50, 2017 | | 2017 |