代表性论文

过滤器
[ Security'23 ]
Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations

USENIX Security Symposium, Anaheim, CA, USA, August 9–11, 2023.

PDF阅读BIB下载
[ [TDSC] ]
Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li
Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware

Transactions on Dependable and Secure Computing, 2022.

[ [TDSC] ]
Guoxing Chen, Yinqian Zhang
Securing TEEs with Verifiable Execution Contracts

Transactions on Dependable and Secure Computing, 2022.

[ [CCS'22] ]
Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang
Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud

ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.

[ [CCS'22] ]
Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes

ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.

[ [CCS'22] ]
Mengyao Xie, Chenggang Wu, Zhe Wang, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation

ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.

[ IEEE Secur & Priv ]
Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution

IEEE Secur. Priv. 18(3): 28-37 (2020)

[ ACSAC'08 ]
Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences

Annual Computer Security Applications Conference, Anaheim, CA, Dec. 2008.

PDF阅读BIB下载
[ CCS'13 ]
Yinqian Zhang, Michael K. Reiter
Düppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud

ACM Conference on Computer and Communications Security, Berlin, Germany, Nov. 2013.

PDF阅读BIB下载
[ CCS'12 ]
Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
Cross-VM Side Channels and Their Use to Extract Private Keys

ACM Conference on Computer and Communications Security, Raleigh, NC, Oct. 2012.

PDF阅读BIB下载
菜单