Follow
Yueqiang Cheng
Yueqiang Cheng
Zhejiang University; Singapore Management University; Carnegie Mellon University
Verified email at baidu.com - Homepage
Title
Cited by
Cited by
Year
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
3562014
Efficient virtualization-based application protection against untrusted operating system
Y Cheng, X Ding, RH Deng
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
362015
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
362013
Hermes attack: Steal {DNN} models with lossless inference accuracy
Y Zhu, Y Cheng, H Zhou, Y Lu
30th USENIX Security Symposium (USENIX Security 21), 2021
312021
{PCKV}: Locally Differentially Private Correlated {Key-Value} Data Collection with Optimized Utility
X Gu, M Li, Y Cheng, L Xiong, Y Cao
29th USENIX security symposium (USENIX security 20), 967-984, 2020
312020
POSTER: Rust SGX SDK: Towards memory safety in Intel SGX enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
312017
Reranz: A light-weight virtual machine to mitigate memory disclosure attacks
Z Wang, C Wu, J Li, Y Lai, X Zhang, WC Hsu, Y Cheng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
302017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
302017
Establishing software-only root of trust on embedded systems: facts and fiction
Y Li, Y Cheng, V Gligor, A Perrig
Cambridge International Workshop on Security Protocols, 50-68, 2015
272015
DriverGuard: A fine-grained protection on I/O flows
Y Cheng, X Ding, RH Deng
European Symposium on Research in Computer Security, 227-244, 2011
272011
SpecuSym: Speculative symbolic execution for cache timing leak detection
S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu, Z Zuo
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
262020
COIN attacks: On insecurity of enclave untrusted interfaces in SGX
MR Khandaker, Y Cheng, Z Wang, T Wei
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
232020
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses
Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
212020
KASR: a reliable and practical approach to attack surface reduction of commodity OS kernels
Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
212018
Secure and efficient software-based attestation for industrial control devices with arm processors
B Chen, X Dong, G Bai, S Jauhar, Y Cheng
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
212017
CONAN: A practical real-time APT detection system with high accuracy and efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Chen, Y Cheng, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing, 2020
202020
DriverGuard: Virtualization-based fine-grained protection on i/o flows
Y Cheng, X Ding, RH Deng
ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-30, 2013
192013
Interface-based side channel attack against intel SGX
J Wang, Y Cheng, Q Li, Y Jiang
arXiv preprint arXiv:1811.05378, 2018
172018
Guardian: Hypervisor as security foothold for personal computers
Y Cheng, X Ding
International Conference on Trust and Trustworthy Computing, 19-36, 2013
172013
Virtualization based password protection against malware in untrusted operating systems
Y Cheng, X Ding
International Conference on Trust and Trustworthy Computing, 201-218, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20