Guoxing Chen
Guoxing Chen
Assistant Professor of Computer Science & Engineering Department, Shanghai Jiao Tong University
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
Crowd-ML: A privacy-preserving learning framework for a crowd of smart devices
J Hamm, AC Champion, G Chen, M Belkin, D Xuan
2015 IEEE 35th International Conference on Distributed Computing Systems, 11-20, 2015
Differentially private access patterns for searchable symmetric encryption
G Chen, TH Lai, MK Reiter, Y Zhang
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 810-818, 2018
Opera: Open remote attestation for intel's secure enclaves
G Chen, Y Zhang, TH Lai
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
On degrees of freedom of cognitive networks with user cooperation
G Chen, Z Xiang, C Xu, M Tao
IEEE Wireless Communications Letters 1 (6), 617-620, 2012
Flash-Loc: Flashing mobile phones for accurate indoor localization
F Yang, Q Zhai, G Chen, AC Champion, J Zhu, D Xuan
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Mobile data collection frameworks: A survey
PY Cao, G Li, G Chen, B Chen
Proceedings of the 2015 Workshop on Mobile Big Data, 25-30, 2015
{MAGE}: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
G Chen, Y Zhang
31st USENIX Security Symposium (USENIX Security 22), 4095-4110, 2022
Defeating speculative-execution attacks on SGX with HyperRace
G Chen, M Li, F Zhang, Y Zhang
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
Towards Formal Verification of State Continuity for Enclave Programs
MK Jangid, G Chen, Y Zhang, Z Lin
30th USENIX Security Symposium (USENIX Security 21), 573-590, 2021
Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2022
EV-matching: Bridging large visual data and electronic data for efficient surveillance
G Li, F Yang, G Chen, Q Zhai, X Li, J Teng, J Zhu, D Xuan, B Chen, ...
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing
W Wang, G Chen, Y Cheng, Y Zhang, Z Lin
International Conference on Detection of Intrusions and Malware, and …, 2021
Exploitable Hardware Features and Vulnerabilities Enhanced Side-Channel Attacks on Intel SGX and Their Countermeasures
G Chen
The Ohio State University, 2019
Secure Hierarchical Deterministic Wallet Supporting Stealth Address
X Yin, Z Liu, G Yang, G Chen, H Zhu
Cryptology ePrint Archive, 2022
Multi-Certificate Attacks Against Proof-of-Elapsed-Time And Their Countermeasures
H Wang, G Chen, Y Zhang, Z Lin
Proc. 29th Annu. Netw. Distrib. Syst. Secur. Symp.(NDSS), 2022
Detecting the vulnerability of multi-party authorization protocols to name matching attacks
W Lin, G Chen, TH Lai, D Lee
Proceedings of the International Conference on Security and Management (SAM), 1, 2014
Securing TEEs With Verifiable Execution Contracts
G Chen, Y Zhang
IEEE Transactions on Dependable and Secure Computing, 2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20