Yulong Zhang
Yulong Zhang
Zweryfikowany adres z google.com
Cytowane przez
Cytowane przez
Incentive compatible moving target defense against vm-colocation attacks in clouds
Y Zhang, M Li, K Bai, M Yu, W Zang
IFIP international information security conference, 388-399, 2012
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th USENIX Security Symposium (USENIX Security 15), 945-959, 2015
Savior: Towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020
Adaptive android kernel live patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
26th USENIX Security Symposium (USENIX Security 17), 1253-1270, 2017
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
M Li, Y Zhang, K Bai, W Zang, M Yu, X He
SECRYPT, 321-326, 2012
POSTER: Rust SGX SDK: Towards memory safety in Intel SGX enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Improving virtualization security by splitting hypervisor into smaller components
W Pan, Y Zhang, M Yu, J Jing
IFIP Annual Conference on Data and Applications Security and Privacy, 298-313, 2012
Enpublic apps: Security threats using ios enterprise and developer certificates
M Zheng, H Xue, Y Zhang, T Wei, JCS Lui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Automatic hot patch generation for android kernels
Z Xu, Y Zhang, L Zheng, L Xia, C Bao, Z Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2397-2414, 2020
Adaptive kernel live patching: An open collaborative effort to ameliorate android n-day root exploits
Y Zhang, Y Chen, C Bao, L Xia, L Zhen, Y Lu, T Wei, X Baidu
Proceedings of Black Hat USA, 2016
Sidewinder: Targeted attack against Android in the golden age of ad libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
Black Hat 14, 2014
Accurate and efficient exploit capture and classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Science China Information Sciences 60 (5), 1-17, 2017
Quantitative survivability evaluation of three virtual machine-based server architectures
Y Yang, Y Zhang, AH Wang, M Yu, W Zang, P Liu, S Jajodia
Journal of network and computer applications 36 (2), 781-790, 2013
Hypebios: Enforcing vm isolation with minimized and decomposed cloud tcb
Y Zhang, W Pan, Q Wang, K Bai, M Yu
Virginia Commonwealth University, Technical report, 2012
SSL Vulnerabilities: Who Listens When Android Applications Talk
A Mettler, Y Zhang, V Raman
FireEye Inc, Milpitas, CA, USA, 2014
To swipe or not to swipe: A challenge for your fingers
Y Zhang, T Wei
RSA Conference, USA, 2015
Diode characteristic of electrolyte-oxide-semiconductor structure for potential chemical and biological applications
YL Zhang, GC Sun, WG Wu
2011 16th International Solid-State Sensors, Actuators and Microsystems …, 2011
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20