ÆÈ·Î¿ì
Yu Ding
Yu Ding
google.comÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
VTrust: Regaining Trust on Virtual Calls
C Zhang, S Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium (NDSS'16) 2016, 2016
952016
Towards Memory Safe Enclave Programming with Rust-SGX
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2333 ¡¦, 2019
612019
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference ¡¦, 2010
592010
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications ¡¦, 2017
332017
Android Low Entropy Demystified
Y Ding, Z Peng, Y Zhou, C Zhang
IEEE International Conference on Communications (ICC), 2014
182014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
152012
Accurate and Efficient Exploit Capture and Classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
SCIENCE CHINA Information Sciences 60 (5), 2017
92017
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software ¡¦, 2020
82020
Poster: AdHoneyDroid: Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
21st ACM Conference on Computer and Communications Security (Poster), 2014
52014
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
32019
Poster: Classifying Downloaders
Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han
IEEE Symposium on Security and Privacy, 2015
3*2015
ÐñéÍÚÂÊïí®Ý¬îÜSQLñ¼ìýÍô击ÛÁåÙÛ°Ûö
H Zhang, Y Ding, L Zhang, L Duan, C Zhang, T Wei, G Li, X Han
Journal of Computer Research and Development 53 (10), 2262-2276, 2016
2*2016
SQL Injection Attack Defense Method Based on Sensitive Characters [J]
Z Huilin, D Yu, Z Lihua
Computer Research and Development 53 (10), 2262-2276, 2016
22016
Secure multiparty computing framework using a restricted operating environment with a guest agent
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent 11,159,322, 2021
12021
Towards Memory Safe Python Enclave for Security Sensitive Computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
12020
Token based secure multiparty computing framework using a restricted operating environment
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent 11,128,617, 2021
2021
Generic verification approach for Protobuf based projects
Q Feng, Y Zhang, P Wang, Y Ding, T Wei
US Patent 10,732,944, 2020
2020
Method, apparatus and system for device identification
Y Ding, T Wei, Y Zhang
US Patent 10,341,093, 2019
2019
ÐñéÍÝÂ̰ݬîÜÎ¥ó×ÊÅÜâÍô击ÛÁåÙÛ°Ûö
H Zhang, G Li, Y Ding, L Duan, X Han, J Xiao
Beijing Da Xue Xue Bao 54 (2), 320-330, 2018
2018
ò¨ÜõøÁ÷»îÜäÌîïשÔ×ÝÂà°
ïËé⣬ ÕóÔÕãô£¬ 韦韬
ñé国教ëÀ网络, 46-50, 2017
2017
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20