Obserwuj
Mengyuan Li
Mengyuan Li
Zweryfikowany adres z osu.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 USENIX Annual Technical Conference (USENIX ATC 18), 133-146, 2018
4422018
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
1672016
Stacco: Differentially analyzing side-channel traces for detecting SSL/TLS vulnerabilities in secure enclaves
Y Xiao, M Li, S Chen, Y Zhang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
602017
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing
H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen
IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016
582016
Exploiting Unprotected {I/O} Operations in {AMD’s} Secure Encrypted Virtualization
M Li, Y Zhang, Z Lin, Y Solihin
28th USENIX Security Symposium (USENIX Security 19), 1257-1272, 2019
442019
SPFM: Scalable and privacy-preserving friend matching in mobile cloud
M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu
IEEE Internet of Things Journal 4 (2), 583-591, 2016
292016
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA
X Li, N Ruan, F Wu, J Li, M Li
2014 IEEE 33rd International Performance Computing and Communications …, 2014
192014
Crossline: Breaking" security-by-crash" based memory isolation in amd sev
M Li, Y Zhang, Z Lin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
142021
A novel broadcast authentication protocol for internet of vehicles
N Ruan, M Li, J Li
Peer-to-Peer Networking and Applications 10 (6), 1331-1343, 2017
112017
{CIPHERLEAKS}: Breaking Constant-time Cryptography on {AMD}{SEV} via the Ciphertext Side Channel
M Li, Y Zhang, H Wang, K Li, Y Cheng
30th USENIX Security Symposium (USENIX Security 21), 717-732, 2021
102021
Defeating speculative-execution attacks on SGX with HyperRace
G Chen, M Li, F Zhang, Y Zhang
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
82019
A paralleling broadcast authentication protocol for sparse RSUs in internet of vehicles
M Li, N Ruan, H Zhu, J Li, X Li
2014 10th International Conference on Mobile Ad-hoc and Sensor Networks, 58-65, 2014
42014
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization
M Li, Y Zhang, H Wang, K Li, Y Cheng
Annual Computer Security Applications Conference, 609-619, 2021
22021
Smartsec: Secret sharing-based location-aware privacy enhancement in smart devices
BB Chirchir, X Zhang, M Li, Q Qian, N Ruan, H Zhu
2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015
22015
vsgx: Virtualizing sgx enclaves on amd sev
S Zhao, M Li, Y Zhangyz, Z Lin
2022 IEEE Symposium on Security and Privacy (SP), 321-336, 2022
12022
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
M Li, L Wilke, J Wichelmann, T Eisenbarth, R Teodorescu, Y Zhang
2022 IEEE Symposium on Security and Privacy (SP), 1541-1541, 2022
12022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–16