Folgen
Wenhao Wang
Titel
Zitiert von
Zitiert von
Jahr
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4382017
Enabling rack-scale confidential computing using heterogeneous trusted execution environment
J Zhu, R Hou, XF Wang, W Wang, J Cao, B Zhao, Z Wang, Y Zhang, ...
2020 IEEE Symposium on Security and Privacy (SP), 1450-1465, 2020
94*2020
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
932018
Bluethunder: A 2-level directional predictor based side-channel attack against sgx
T Huo, X Meng, W Wang, C Hao, P Zhao, J Zhai, M Li
IACR Transactions on Cryptographic Hardware and Embedded Systems, 321-347, 2020
582020
Randomized last-level caches are still vulnerable to cache side-channel attacks! but we can fix it
W Song, B Li, Z Xue, Z Li, W Wang, P Liu
2021 IEEE Symposium on Security and Privacy (SP), 955-969, 2021
552021
A community effort to protect genomic data sharing, collaboration and outsourcing
S Wang, X Jiang, H Tang, X Wang, D Bu, K Carey, SOM Dyke, D Fox, ...
NPJ genomic medicine 2 (1), 33, 2017
462017
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
M Liu, J Yang, W Wang, D Lin
37th Annual International Conference on the Theory and Applications of …, 2018
362018
Toward scalable fully homomorphic encryption through light trusted computing assistance
W Wang, Y Jiang, Q Shen, W Huang, H Chen, S Wang, XF Wang, H Tang, ...
arXiv preprint arXiv:1905.07766, 2019
302019
System for decentralized ownership and secure sharing of personalized health data
S Wang, X Wang, H Tang, W Wang, A Farahanchi, H Zheng
US Patent 11,003,791, 2021
292021
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, N Surya, Y Gao, K Li, ...
2022 USENIX Annual Technical Conference, 2022
272022
Searching cubes for testing Boolean functions and its application to Trivium
M Liu, D Lin, W Wang
2015 IEEE International Symposium on Information Theory (ISIT), 496-500, 2015
192015
Binary code retrofitting and hardening using SGX
S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
182017
iDASH secure genome analysis competition 2017
XF Wang, H Tang, S Wang, X Jiang, W Wang, D Bu, L Wang, Y Jiang, ...
BMC medical genomics 11, 1-2, 2018
172018
Implicit hammer: Cross-privilege-boundary rowhammer through implicit accesses
Z Zhang, W He, Y Cheng, W Wang, Y Gao, D Liu, K Li, S Nepal, A Fu, ...
IEEE Transactions on Dependable and Secure Computing, 2022
132022
HyperEnclave: An Open and Cross-platform Trusted Execution Environment
Y Jia, S Liu, W Wang, Y Chen, Z Zhai, S Yan, Z He
2022 USENIX Annual Technical Conference, 2022
132022
Practical and efficient in-enclave verification of privacy compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
9*2021
Whistleblower: A system-level empirical study on rowhammer
W He, Z Zhang, Y Cheng, W Wang, W Song, Y Gao, Q Zhang, K Li, D Liu, ...
IEEE Transactions on Computers, 2023
62023
Trust beyond border: lightweight, verifiable user isolation for protecting in-enclave services
W Wang, W Liu, H Chen, XF Wang, H Tian, D Lin
IEEE transactions on dependable and secure computing 20 (1), 522-538, 2021
62021
Understanding TEE containers, easy to use? Hard to trust
W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang
arXiv preprint arXiv:2109.01923, 2021
62021
Analysis of multiple checkpoints in non-perfect and perfect rainbow tradeoff revisited
W Wang, D Lin
International Conference on Information and Communications Security, 288-301, 2013
62013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20