Obserwuj
Wenhao Wang
Tytuł
Cytowane przez
Cytowane przez
Rok
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3172017
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
682018
Enabling rack-scale confidential computing using heterogeneous trusted execution environment
J Zhu, R Hou, XF Wang, W Wang, J Cao, B Zhao, Z Wang, Y Zhang, ...
2020 IEEE Symposium on Security and Privacy (SP), 1450-1465, 2020
40*2020
A community effort to protect genomic data sharing, collaboration and outsourcing
S Wang, X Jiang, H Tang, X Wang, D Bu, K Carey, SOM Dyke, D Fox, ...
NPJ genomic medicine 2 (1), 1-6, 2017
392017
Bluethunder: A 2-level directional predictor based side-channel attack against sgx
T Huo, X Meng, W Wang, C Hao, P Zhao, J Zhai, M Li
IACR Transactions on Cryptographic Hardware and Embedded Systems, 321-347, 2020
302020
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
M Liu, J Yang, W Wang, D Lin
37th Annual International Conference on the Theory and Applications of …, 2018
272018
Randomized last-level caches are still vulnerable to cache side-channel attacks! But we can fix it
W Song, B Li, Z Xue, Z Li, W Wang, P Liu
2021 IEEE Symposium on Security and Privacy (SP), 955-969, 2021
212021
Searching cubes for testing Boolean functions and its application to Trivium
M Liu, D Lin, W Wang
2015 IEEE International Symposium on Information Theory (ISIT), 496-500, 2015
172015
iDASH secure genome analysis competition 2017
XF Wang, H Tang, S Wang, X Jiang, W Wang, D Bu, L Wang, Y Jiang, ...
BMC medical genomics 11 (4), 1-2, 2018
152018
Toward scalable fully homomorphic encryption through light trusted computing assistance
W Wang, Y Jiang, Q Shen, W Huang, H Chen, S Wang, XF Wang, H Tang, ...
arXiv preprint arXiv:1905.07766, 2019
122019
Binary code retrofitting and hardening using SGX
S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
122017
Improvement and analysis of VDP method in time/memory tradeoff applications
W Wang, D Lin, Z Li, T Wang
International Conference on Information and Communications Security, 282-296, 2011
52011
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, N Surya, Y Gao, K Li, ...
2022 USENIX Annual Technical Conference, 2022
42022
Comments on “A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation”
W Wang, M Liu, Y Zhang
Cryptography and Communications 5 (1), 1-6, 2013
42013
Practical and Efficient in-Enclave Verification of Privacy Compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
3*2021
System for decentralized ownership and secure sharing of personalized health data
S Wang, X Wang, H Tang, W Wang, A Farahanchi, H Zheng
US Patent 11,003,791, 2021
32021
Analysis of multiple checkpoints in non-perfect and perfect rainbow tradeoff revisited
W Wang, D Lin
International Conference on Information and Communications Security, 288-301, 2013
32013
Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords
J Zou, D Lin, C Hao, Z Li, W Wang, Y Lu
Chinese Journal of Electronics 22 (4), 671-676, 2013
32013
Beware of your screen: Anonymous fingerprinting of device screens for off-line payment protection
Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang
Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018
22018
Symbolic-like computation and conditional differential cryptanalysis of quark
J Yang, M Liu, D Lin, W Wang
International Workshop on Security, 244-261, 2018
22018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20