Artikkelit, joihin on yleisen käytön mandaatti - Zhiqiang LinLisätietoja
Ei saatavilla missään: 1
SaTS'23: The 1st ACM Workshop on Secure and Trustworthy Superapps
Z Lin, X Liao
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
Mandaatit: US National Science Foundation
Saatavilla jossain: 97
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
Mandaatit: US National Science Foundation
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing
J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang, WC Lau, M Sun, R Yang, ...
Network and Distributed Security Symposium (NDSS), 2018
Mandaatit: US National Science Foundation, US Department of Defense, National Natural …
SGX-Log: Securing system logs with SGX
V Karande, E Bauman, Z Lin, L Khan
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Mandaatit: US National Science Foundation, US Department of Defense
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics
E Bauman, Z Lin, KW Hamlen
Proceedings of the 25th Network and Distributed Systems Security Symposium …, 2018
Mandaatit: US National Science Foundation, US Department of Defense
{SAVIOR}: Securing autonomous vehicles with robust physical invariants
R Quinonez, J Giraldo, L Salazar, E Bauman, A Cardenas, Z Lin
29th USENIX security symposium (USENIX Security 20), 895-912, 2020
Mandaatit: US National Science Foundation, US Department of Defense
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps
C Zuo, Z Lin, Y Zhang
Proceedings of 2019 IEEE Symposium on Security and Privacy, 2019
Mandaatit: US National Science Foundation, US Department of Defense
Injected and delivered: Fabricating implicit control over actuation systems by spoofing inertial sensors
Y Tu, Z Lin, I Lee, X Hei
27th USENIX security symposium (USENIX Security 18), 1545-1562, 2018
Mandaatit: US National Science Foundation, US Department of Defense
Adaptive encrypted traffic fingerprinting with bi-directional dependence
K Al-Naami, S Chandra, A Mustafa, L Khan, Z Lin, K Hamlen, ...
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Mandaatit: US National Science Foundation
{TXSPECTOR}: Uncovering attacks in ethereum from transactions
M Zhang, X Zhang, Y Zhang, Z Lin
29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020
Mandaatit: US National Science Foundation
Exploiting unprotected {I/O} operations in {AMD’s} secure encrypted virtualization
M Li, Y Zhang, Z Lin, Y Solihin
28th USENIX Security Symposium (USENIX Security 19), 1257-1272, 2019
Mandaatit: US National Science Foundation
Automatic fingerprinting of vulnerable ble iot devices with static uuids from mobile apps
C Zuo, H Wen, Z Lin, Y Zhang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Mandaatit: US National Science Foundation
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
Y Gu, Q Zhao, Y Zhang, Z Lin
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
Mandaatit: US National Science Foundation, US Department of Defense
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Mandaatit: US National Science Foundation
A study of the privacy of covid-19 contact tracing apps
H Wen, Q Zhao, Z Lin, D Xuan, N Shroff
Security and Privacy in Communication Networks: 16th EAI International …, 2020
Mandaatit: US National Science Foundation
Sgx-bigmatrix: A practical encrypted data analytic framework with trusted processors
F Shaon, M Kantarcioglu, Z Lin, L Khan
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Mandaatit: US National Science Foundation, US National Institutes of Health
Type inference on executables
J Caballero, Z Lin
ACM Computing Surveys (CSUR) 48 (4), 1-35, 2016
Mandaatit: US National Science Foundation, Government of Spain
Freeguard: A faster secure heap allocator
S Silvestro, H Liu, C Crosser, Z Lin, T Liu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Mandaatit: US National Science Foundation, US Department of Defense
{Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT}
H Wen, QA Chen, Z Lin
29th USENIX security symposium (USENIX Security 20), 949-965, 2020
Mandaatit: US National Science Foundation
Breaking secure pairing of bluetooth low energy using downgrade attacks
Y Zhang, J Weng, R Dey, Y Jin, Z Lin, X Fu
29th USENIX Security Symposium (USENIX Security 20), 37-54, 2020
Mandaatit: US National Science Foundation, National Natural Science Foundation of China
Tietokoneohjelma arvioi ja määrittää julkaisu- ja rahoitustiedot automaattisesti