|Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms|
Z Li, W Liu, H Chen, XF Wang, X Liao, L Xing, M Zha, H Jin, D Zou
2022 IEEE Symposium on Security and Privacy (SP), 2397-2412, 2022
|Understanding TEE Containers, Easy to Use? Hard to Trust|
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
|Practical and Efficient in-Enclave Verification of Privacy Compliance|
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
|The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition|
TT Kuo, X Jiang, H Tang, XF Wang, A Harmanci, M Kim, K Post, D Bu, ...
Journal of the American Medical Informatics Association 29 (12), 2182-2190, 2022
|HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework|
C Widanage, W Liu, J Li, H Chen, XF Wang, H Tang, J Fox
2021 IEEE 14th International Conference on Cloud Computing (CLOUD), 733-743, 2021
W Liu, W Wang, X Wang, X Meng, Y Lu, H Chen, X Wang, Q Shen, ...
arXiv preprint arXiv:2007.10513, 2020
|Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services|
W Wang, W Liu, H Chen, X Wang, H Tian, D Lin
IEEE Transactions on Dependable and Secure Computing, 2021