Peeking behind the curtains of serverless platforms L Wang, M Li, Y Zhang, T Ristenpart, M Swift 2018 USENIX annual technical conference (USENIX ATC 18), 133-146, 2018 | 775 | 2018 |
When CSI meets public WiFi: Inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 241 | 2016 |
Exploiting unprotected {I/O} operations in {AMD’s} secure encrypted virtualization M Li, Y Zhang, Z Lin, Y Solihin 28th USENIX Security Symposium (USENIX Security 19), 1257-1272, 2019 | 114 | 2019 |
Stacco: Differentially analyzing side-channel traces for detecting SSL/TLS vulnerabilities in secure enclaves Y Xiao, M Li, S Chen, Y Zhang Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 92 | 2017 |
{CIPHERLEAKS}: Breaking Constant-time Cryptography on {AMD}{SEV} via the Ciphertext Side Channel M Li, Y Zhang, H Wang, K Li, Y Cheng 30th USENIX Security Symposium (USENIX Security 21), 717-732, 2021 | 91 | 2021 |
You can jam but you cannot hide: Defending against jamming attacks for geo-location database driven spectrum sharing H Zhu, C Fang, Y Liu, C Chen, M Li, XS Shen IEEE Journal on Selected Areas in Communications 34 (10), 2723-2737, 2016 | 75 | 2016 |
Crossline: Breaking" security-by-crash" based memory isolation in amd sev M Li, Y Zhang, Z Lin Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 63 | 2021 |
A systematic look at ciphertext side channels on AMD SEV-SNP M Li, L Wilke, J Wichelmann, T Eisenbarth, R Teodorescu, Y Zhang 2022 IEEE Symposium on Security and Privacy (SP), 337-351, 2022 | 54 | 2022 |
vSGX: virtualizing SGX enclaves on AMD SEV S Zhao, M Li, Y Zhangyz, Z Lin 2022 IEEE Symposium on Security and Privacy (SP), 321-336, 2022 | 31 | 2022 |
SPFM: Scalable and privacy-preserving friend matching in mobile cloud M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu IEEE Internet of Things Journal 4 (2), 583-591, 2016 | 31 | 2016 |
TLB poisoning attacks on AMD secure encrypted virtualization M Li, Y Zhang, H Wang, K Li, Y Cheng Proceedings of the 37th Annual Computer Security Applications Conference …, 2021 | 25 | 2021 |
PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV W Wang, M Li, Y Zhang, Z Lin International Conference on Detection of Intrusions and Malware, and …, 2023 | 23 | 2023 |
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA X Li, N Ruan, F Wu, J Li, M Li 2014 IEEE 33rd International Performance Computing and Communications …, 2014 | 21 | 2014 |
Defeating speculative-execution attacks on SGX with HyperRace G Chen, M Li, F Zhang, Y Zhang 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 20 | 2019 |
A novel broadcast authentication protocol for internet of vehicles N Ruan, M Li, J Li Peer-to-Peer Networking and Applications 10, 1331-1343, 2017 | 20 | 2017 |
{CipherH}: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations S Deng, M Li, Y Tang, S Wang, S Yan, Y Zhang 32nd USENIX Security Symposium (USENIX Security 23), 6843-6860, 2023 | 12 | 2023 |
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments M Li, Y Yang, G Chen, M Yan, Y Zhang Proceedings of the 19th ACM Asia Conference on Computer and Communications …, 2024 | 5 | 2024 |
A paralleling broadcast authentication protocol for sparse rsus in internet of vehicles M Li, N Ruan, H Zhu, J Li, X Li 2014 10th International Conference on Mobile Ad-hoc and Sensor Networks, 58-65, 2014 | 4 | 2014 |
Smartsec: Secret sharing-based location-aware privacy enhancement in smart devices BB Chirchir, X Zhang, M Li, Q Qian, N Ruan, H Zhu 2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015 | 3 | 2015 |
Translation lookaside buffer (tlb) poisoning attacks on secure encrypted virtualization H Wang, K Li, LI Mengyuan, Y Zhang, Y Cheng US Patent App. 17/746,585, 2023 | 2 | 2023 |