Obserwuj
Zhuojia Shen
Tytuł
Cytowane przez
Cytowane przez
Rok
Silhouette: Efficient protected shadow stacks for embedded systems
J Zhou, Y Du, Z Shen, L Ma, J Criswell, RJ Walls
29th USENIX Security Symposium (USENIX Security 20), 1219-1236, 2020
482020
Shielding Software From Privileged {Side-Channel} Attacks
X Dong, Z Shen, J Criswell, AL Cox, S Dwarkadas
27th USENIX Security Symposium (USENIX Security 18), 1441-1458, 2018
462018
Spectres, virtual ghosts, and hardware support
X Dong, Z Shen, J Criswell, A Cox, S Dwarkadas
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
262018
Holistic {Control-Flow} protection on {Real-Time} embedded systems with kage
Y Du, Z Shen, K Dharsee, J Zhou, RJ Walls, J Criswell
31st USENIX Security Symposium (USENIX Security 22), 2281-2298, 2022
192022
Restricting control flow during speculative execution with venkman
Z Shen, J Zhou, D Ojha, J Criswell
arXiv preprint arXiv:1903.10651, 2019
152019
Fast execute-only memory for embedded systems
Z Shen, K Dharsee, J Criswell
2020 IEEE Secure Development (SecDev), 7-14, 2020
102020
Restricting control flow during speculative execution
Z Shen, J Zhou, D Ojha, J Criswell
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
82018
Randezvous: Making Randomization Effective on MCUs
Z Shen, K Dharsee, J Criswell
Proceedings of the 38th Annual Computer Security Applications Conference, 28-41, 2022
42022
InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion
Z Shen, J Criswell
arXiv preprint arXiv:2304.08717, 2023
12023
Embedding of hypercube into cylinder
WX Ji, QH Liu, GZ Wang, ZJ Shen
arXiv preprint arXiv:1511.07932, 2015
12015
Enforcing Low-Cost Security for ARM
Z Shen
University of Rochester, 2023
2023
Poster:(SF) 2I-Structure Field Software Fault Isolation
S Gravani, Z Shen, J Criswell
Future 4, 1.22, 0
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–12