Follow
Wenjie Xiong
Title
Cited by
Cited by
Year
Run-time accessible DRAM PUFs in commodity devices
W Xiong, A Schaller, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
912016
Leaking information through cache LRU states
W Xiong, J Szefer
2020 IEEE International Symposium on High Performance Computer Architecture …, 2020
772020
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
752017
Decay-based DRAM PUFs in commodity devices
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
IEEE Transactions on Dependable and Secure Computing 16 (3), 462-475, 2018
622018
A parylene self-locking cuff electrode for peripheral nerve stimulation and recording
H Yu, W Xiong, H Zhang, W Wang, Z Li
Journal of Microelectromechanical Systems 23 (5), 1025-1035, 2014
622014
Survey of transient execution attacks and their mitigations
W Xiong, J Szefer
ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021
532021
Secure tlbs
S Deng, W Xiong, J Szefer
Proceedings of the 46th International Symposium on Computer Architecture …, 2019
452019
Fingerprinting cloud FPGA infrastructures
S Tian, W Xiong, I Giechaskiel, K Rasmussen, J Szefer
Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020
442020
Analysis of secure caches using a three-step model for timing-based attacks
S Deng, W Xiong, J Szefer
Journal of Hardware and Systems Security 3 (4), 397-425, 2019
322019
Cache timing side-channel vulnerability checking with computation tree logic
S Deng, W Xiong, J Szefer
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
252018
A benchmark suite for evaluating caches' vulnerability to timing attacks
S Deng, W Xiong, J Szefer
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
242020
Ultrahigh-Q, largely deformed microcavities coupled by a free-space laser beam
L Shao, L Wang, W Xiong, XF Jiang, QF Yang, YF Xiao
Applied Physics Letters 103 (12), 2013
212013
Survey of transient execution attacks
W Xiong, J Szefer
arXiv preprint arXiv:2005.13435, 2020
202020
SecChisel framework for security verification of secure processor architectures
S Deng, D Gümüşoğlu, W Xiong, S Sari, YS Gener, C Lu, O Demir, ...
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
202019
Intrinsic run-time row hammer PUFs: Leveraging the row hammer effect for run-time cryptography and improved security
NA Anagnostopoulos, T Arul, Y Fan, C Hatzfeld, A Schaller, W Xiong, ...
Cryptography 2 (3), 13, 2018
192018
Survey of Approaches for Security Verification of Hardware/Software Systems.
O Demir, W Xiong, F Zaghloul, J Szefer
IACR Cryptol. ePrint Arch. 2016, 846, 2016
192016
Characterization of mpc-based private inference for transformer-based models
Y Wang, GE Suh, W Xiong, B Lefaudeux, B Knott, M Annavaram, ...
2022 IEEE International Symposium on Performance Analysis of Systems and …, 2022
182022
Cloud FPGA cartography using PCIe contention
S Tian, I Giechaskiel, W Xiong, J Szefer
2021 IEEE 29th Annual International Symposium on Field-Programmable Custom …, 2021
172021
Spying on Temperature using DRAM
W Xiong, NA Anagnostopoulos, A Schaller, S Katzenbeisser, J Szefer
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 13-18, 2019
162019
Cocktail party attack: Breaking aggregation-based privacy in federated learning using independent component analysis
S Kariyappa, C Guo, K Maeng, W Xiong, GE Suh, MK Qureshi, HHS Lee
International Conference on Machine Learning, 15884-15899, 2023
152023
The system can't perform the operation now. Try again later.
Articles 1–20