Seguir
Xinyang Ge
Xinyang Ge
Microsoft Research
Dirección de correo verificada de microsoft.com - Página principal
Título
Citado por
Citado por
Año
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014
1882014
Griffin: Guarding control flows using intel processor trace
X Ge, W Cui, T Jaeger
Proceedings of the 22nd ACM International Conference on Architectural …, 2017
1822017
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1752017
Fine-grained control-flow integrity for kernel software
X Ge, N Talele, M Payer, T Jaeger
Proceedings of the 1st IEEE European Symposium on Security and Privacy, 179-194, 2016
1752016
REPT: Reverse Debugging of Failures in Deployed Software
W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun
Proceedings of the 13th USENIX Symposium on Operating Systems Design and …, 2018
1112018
Lazy Diagnosis of In-Production Concurrency Bugs
B Kasikci, W Cui, X Ge, B Niu
Proceedings of the 26th Symposium on Operating Systems Principles, 582-598, 2017
442017
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
H Vijayakumar, X Ge, M Payer, T Jaeger
Proceedings of the 23rd USENIX Security Symposium, 973-988, 2014
422014
A new prediction approach based on linear regression for collaborative filtering
X Ge, J Liu, Q Qi, Z Chen
Proceedings of the 8th International Conference on Fuzzy Systems and …, 2011
262011
An evil copy: How the loader betrays you
X Ge, M Payer, T Jaeger
Proceedings of the 21st Network and Distributed System Security Symposium 15, 2017
242017
Hecate: Lifting and shifting on-premises workloads to an untrusted cloud
X Ge, HC Kuo, W Cui
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
212022
Reverse debugging of kernel failures in deployed systems
X Ge, B Niu, W Cui
2020 USENIX Annual Technical Conference (USENIX ATC 20), 281-292, 2020
212020
Pileus: Protecting user resources from vulnerable cloud services
Y Sun, G Petracca, X Ge, T Jaeger
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
212016
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
202018
HYPERFUZZER: An efficient hybrid fuzzer for virtual cpus
X Ge, B Niu, R Brotzman, Y Chen, HS Han, P Godefroid, W Cui
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
132021
Core slicing: closing the gap between leaky confidential {VMs} and bare-metal cloud
Z Zhou, Y Shan, W Cui, X Ge, M Peinado, A Baumann
17th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2023
122023
Protecting commercial off-the-shelf program binaries from piracy using hardware enclaves
X Ge, W Cui, B Niu, LT Chen
US Patent 11,500,969, 2022
92022
Embedding code contexts for cryptographic api suggestion: New methodologies and comparisons
Y Xiao, S Ahmed, W Song, X Ge, B Viswanath, D Yao
arXiv preprint arXiv:2103.08747, 2021
52021
Measurement of Embedding Choices on Cryptographic API Completion Tasks
Y Xiao, W Song, S Ahmed, X Ge, B Viswanath, N Meng, D Yao
ACM Transactions on Software Engineering and Methodology 33 (3), 1-30, 2024
22024
Pagoda: Towards binary code privacy protection with sgx-based execute-only memory
J Yu, X Ge, T Jaeger, CW Fletcher, W Cui
2022 IEEE International Symposium on Secure and Private Execution …, 2022
22022
Reverse debugging of software failures
W Cui, X Ge, BCC Kasikci, B Niu, R Wang, I Yun
US Patent 10,565,511, 2020
22020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20