Folgen
Wenhao Wang
Titel
Zitiert von
Zitiert von
Jahr
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3302017
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
712018
Enabling rack-scale confidential computing using heterogeneous trusted execution environment
J Zhu, R Hou, XF Wang, W Wang, J Cao, B Zhao, Z Wang, Y Zhang, ...
2020 IEEE Symposium on Security and Privacy (SP), 1450-1465, 2020
47*2020
A community effort to protect genomic data sharing, collaboration and outsourcing
S Wang, X Jiang, H Tang, X Wang, D Bu, K Carey, SOM Dyke, D Fox, ...
NPJ genomic medicine 2 (1), 1-6, 2017
402017
Bluethunder: A 2-level directional predictor based side-channel attack against sgx
T Huo, X Meng, W Wang, C Hao, P Zhao, J Zhai, M Li
IACR Transactions on Cryptographic Hardware and Embedded Systems, 321-347, 2020
322020
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
M Liu, J Yang, W Wang, D Lin
37th Annual International Conference on the Theory and Applications of …, 2018
282018
Randomized last-level caches are still vulnerable to cache side-channel attacks! But we can fix it
W Song, B Li, Z Xue, Z Li, W Wang, P Liu
2021 IEEE Symposium on Security and Privacy (SP), 955-969, 2021
232021
Searching cubes for testing Boolean functions and its application to Trivium
M Liu, D Lin, W Wang
2015 IEEE International Symposium on Information Theory (ISIT), 496-500, 2015
172015
iDASH secure genome analysis competition 2017
XF Wang, H Tang, S Wang, X Jiang, W Wang, D Bu, L Wang, Y Jiang, ...
BMC medical genomics 11 (4), 1-2, 2018
162018
Toward scalable fully homomorphic encryption through light trusted computing assistance
W Wang, Y Jiang, Q Shen, W Huang, H Chen, S Wang, XF Wang, H Tang, ...
arXiv preprint arXiv:1905.07766, 2019
142019
Binary code retrofitting and hardening using SGX
S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
122017
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, N Surya, Y Gao, K Li, ...
2022 USENIX Annual Technical Conference, 2022
72022
System for decentralized ownership and secure sharing of personalized health data
S Wang, X Wang, H Tang, W Wang, A Farahanchi, H Zheng
US Patent 11,003,791, 2021
72021
Improvement and analysis of VDP method in time/memory tradeoff applications
W Wang, D Lin, Z Li, T Wang
International Conference on Information and Communications Security, 282-296, 2011
52011
Comments on “A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation”
W Wang, M Liu, Y Zhang
Cryptography and Communications 5 (1), 1-6, 2013
42013
Practical and Efficient in-Enclave Verification of Privacy Compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
3*2021
Analysis of multiple checkpoints in non-perfect and perfect rainbow tradeoff revisited
W Wang, D Lin
International Conference on Information and Communications Security, 288-301, 2013
32013
Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords
J Zou, D Lin, C Hao, Z Li, W Wang, Y Lu
Chinese Journal of Electronics 22 (4), 671-676, 2013
32013
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability
Z Zhang, W He, Y Cheng, W Wang, Y Gao, M Wang, K Li, S Nepal, ...
IEEE Transactions on Information Forensics and Security 16, 5167-5181, 2021
22021
Understanding TEE Containers, Easy to Use? Hard to Trust
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
22021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20