关注
Wenbo Shen
Wenbo Shen
在 zju.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
3972014
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning
NDSS 16, 21-24, 2016
1202016
Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
W Shen, P Ning, X He, H Dai
2013 IEEE Symposium on Security and Privacy, 174-188, 2013
962013
{PeX}: A permission check analysis framework for linux kernel
T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang
28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019
872019
Is link signature dependable for wireless security?
X He, H Dai, W Shen, P Ning
2013 Proceedings IEEE INFOCOM, 200-204, 2013
742013
NORAX: Enabling execute-only memory for COTS binaries on AArch64
Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ...
2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017
652017
Ptrix: Efficient hardware-assisted fuzzing for cots binary
Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
622019
Spoke: Scalable knowledge collection and attack surface analysis of access control policy for security enhanced android
R Wang, AM Azab, W Enck, N Li, P Ning, X Chen, W Shen, Y Cheng
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
432017
Toward proper guard zones for link signature
X He, H Dai, W Shen, P Ning, R Dutta
IEEE Transactions on Wireless Communications 15 (3), 2104-2117, 2015
422015
MCR decoding: A MIMO approach for defending against wireless jamming attacks
W Shen, P Ning, X He, H Dai, Y Liu
2014 IEEE Conference on Communications and Network Security, 133-138, 2014
412014
Where are you from? Confusing location distinction using virtual multipath camouflage
S Fang, Y Liu, W Shen, H Zhu
Proceedings of the 20th annual international conference on Mobile computing …, 2014
382014
The security of link signature: A view from channel models
X He, H Dai, Y Huang, D Wang, W Shen, P Ning
2014 IEEE conference on communications and network security, 103-108, 2014
322014
Virtual multipath attack and defense for location distinction in wireless networks
S Fang, Y Liu, W Shen, H Zhu, T Wang
IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016
312016
Security challenges in the container cloud
Y Yang, W Shen, B Ruan, W Liu, K Ren
2021 Third IEEE International Conference on Trust, Privacy and Security in …, 2021
292021
Demons in the shared kernel: Abstract resource attacks against os-level virtualization
N Yang, W Shen, J Li, Y Yang, K Lu, J Xiao, T Zhou, C Qin, W Yu, J Ma, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
282021
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations
P Ning, SE McLaughlin, MC Grace, AM Azab, R BHUTKAR, W Shen, ...
US Patent App. 10/320,745, 2019
27*2019
Vdom: Fast and unlimited virtual domains on multiple architectures
Z Yuan, S Hong, R Chang, Y Zhou, W Shen, K Ren
Proceedings of the 28th ACM International Conference on Architectural …, 2023
192023
Firmguide: Boosting the capability of rehosting embedded linux kernels through model-guided kernel execution
Q Liu, C Zhang, L Ma, M Jiang, Y Zhou, L Wu, W Shen, X Luo, Y Liu, ...
2021 36th IEEE/ACM International Conference on Automated Software …, 2021
182021
An open source web-mapping system for tourism planning and marketing
SK Supak, HA Devine, GL Brothers, S Rozier Rich, W Shen
Journal of Travel & Tourism Marketing 31 (7), 835-853, 2014
182014
Methods and apparatus to enable runtime checksum verification of block device images
J Shah, S Wei, A Azab, X Chen, P Ning, W Shen, M Grace
US Patent 9,984,255, 2018
172018
系统目前无法执行此操作,请稍后再试。
文章 1–20