代表性论文
[ [TDSC] ]
Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li
Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware
Transactions on Dependable and Secure Computing, 2022.
[ [TDSC] ]
Guoxing Chen, Yinqian Zhang
Securing TEEs with Verifiable Execution Contracts
Transactions on Dependable and Secure Computing, 2022.
[ [CCS'22] ]
Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang
Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud
ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.
[ [CCS'22] ]
Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.
[ [CCS'22] ]
Mengyao Xie, Chenggang Wu, Zhe Wang, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation
ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.
[ IEEE Secur & Priv ]
Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution
IEEE Secur. Priv. 18(3): 28-37 (2020)