Követés
Jidong Xiao
Cím
Hivatkozott rá
Hivatkozott rá
Év
Security implications of memory deduplication in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
992013
A covert channel construction in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
452012
Kernel data attack is a realistic security threat
J Xiao, H Huang, H Wang
Security and Privacy in Communication Networks: 11th EAI International …, 2015
322015
Contextualizing consensus protocols in blockchain: A short survey
G Bashar, G Hill, S Singha, P Marella, GG Dagher, J Xiao
2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019
262019
KShot: Live kernel patching with SMM and SGX
L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
232020
HyperLink: Virtual machine introspection and memory forensic analysis without kernel source code
J Xiao, L Lu, H Wang, X Zhu
2016 IEEE international conference on autonomic computing (ICAC), 127-136, 2016
182016
Nighthawk: Transparent system introspection from ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
172019
A coprocessor-based introspection framework via intel management engine
L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021
132021
Understanding the manipulation on recommender systems through web injection
Y Zhang, J Xiao, S Hao, H Wang, S Zhu, S Jajodia
IEEE Transactions on Information Forensics and Security 15, 3807-3818, 2019
112019
Cloudskulk: A nested virtual machine based rootkit and its detection
J Connelly, T Roberts, X Gao, J Xiao, H Wang, A Stavrou
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
92021
Understanding the security implication of aborting virtual machine live migration
X Gao, J Xiao, H Wang, A Stavrou
IEEE Transactions on Cloud Computing 10 (2), 1275-1286, 2020
92020
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment
D Le, J Xiao, H Huang, H Wang
10th International Conference on Network and Service Management (CNSM) and …, 2014
62014
Hyperprobe: Towards virtual machine extrospection
J Xiao, L Lu, H Huang, H Wang
29th Large Installation System Administration Conference (LISA15), 1-12, 2015
52015
All use-after-free vulnerabilities are not created equal: an empirical study on their characteristics and detectability
Z Chen, D Liu, J Xiao, H Wang
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
42023
COMS: customer oriented migration service
K Huang, X Gao, F Zhang, J Xiao
2017 IEEE 10th international conference on cloud computing (CLOUD), 692-695, 2017
42017
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds
J Xiao, L Lu, H Huang, H Wang
IEEE Transactions on Cloud Computing 9 (1), 401-413, 2018
22018
A study of the multiple sign-in feature in web applications
M Albahar, X Gao, G Dagher, D Liu, F Zhang, J Xiao
Security and Privacy in Communication Networks: 15th EAI International …, 2019
12019
An Exploration of Fuzzing for Discovering Use-After-Free Vulnerabilities
Z Chen, J Xiao, A Stavrou, H Wang
2024 IEEE 35th International Symposium on Software Reliability Engineering …, 2024
2024
Exploiting CPU Clock Modulation for Covert Communication Channel
S Alam, J Xiao, NU Eisty
2024 IEEE/ACIS 22nd International Conference on Software Engineering …, 2024
2024
Hardware-Assisted Live Kernel Function Updating on Intel Platforms
L Zhou, F Zhang, K Leach, X Ding, Z Ning, G Wang, J Xiao
IEEE Transactions on Dependable and Secure Computing 21 (4), 2085-2098, 2023
2023
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20