Yue Chen
Yue Chen
Palo Alto Networks
Zweryfikowany adres z paloaltonetworks.com - Strona główna
Cytowane przez
Cytowane przez
A novel chaos-based fragile watermarking for image tampering detection and self-recovery
Y Chen
Harbin Institute of Technology, 2011
Remix: On-demand live randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
Armlock: Hardware-based fault isolation for arm
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Value driven security threat modeling based on attack path analysis
Y Chen, B Boehm, L Sheppard
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
Secpod: a framework for virtualization-based security systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 347-360, 2015
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
USENIX Security Symposium 2017, 2017
Downgrade Attack on TrustZone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
Adaptive intrusion response to minimize risk over multiple network attacks
S Tanachaiwiwat, K Hwang, Y Chen
ACM Trans on Information and System Security 19 (1-30), 95-96, 2002
Design and implementation of SecPod, a framework for virtualization-based security systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017
Pinpointing vulnerabilities
Y Chen, M Khandaker, Z Wang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Method and system for detecting and correcting errors while accessing memory devices in microprocessor systems
Y Zhang, PY Lu, Y Chen
US Patent 7,334,179, 2008
Stakeholder value driven threat modeling for off the shelf based systems
Y Chen, BW Boehm
29th International Conference on Software Engineering (ICSE'07 Companion), 91-92, 2007
Secure in-cache execution
Y Chen, M Khandaker, Z Wang
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
Method and system for codec with polyringer
Y Chen, N Sollenberger, M Wang
US Patent 7,653,204, 2010
Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-day Root Exploits
T Zhang, Yulong and Chen, Yue and Bao, Chenfu and Xia, Liangzhao and Zhen ...
Black Hat USA 2016, 2016
Measuring Security Investment Benefit for Off the Shelf Software Systems-A Stakeholder Value Driven Approach.
Y Chen, B Boehm, L Sheppard
WEIS, 2007
Wireless device having a hardware accelerator to support equalization processing
Y Chen
US Patent 7,643,549, 2010
Diesel Engine Fault Diagnosis Based on D-S Evidence Theory
L Tong, Y Chen, Z Wang, Q Qin
Science Technology and Engineering, 3749-3752, 2010
Method and system for analog and digital RF receiver interface
Y Chen, N Sollenberger, M Wang
US Patent 8,060,050, 2011
Equalize training method using re-encoded bits and known training sequences
Y Chen, A Molev-Shteiman, A Heiman, NR Sollenberger, HH Zeng, ...
US Patent 7,903,728, 2011
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20