Follow
Wenjie Xiong
Title
Cited by
Cited by
Year
Run-time accessible DRAM PUFs in commodity devices
W Xiong, A Schaller, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
902016
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
2017 IEEE International Symposium on Hardware Oriented Security and Trust …, 2017
752017
Leaking information through cache LRU states
W Xiong, J Szefer
2020 IEEE International Symposium on High Performance Computer Architecture …, 2020
732020
A parylene self-locking cuff electrode for peripheral nerve stimulation and recording
H Yu, W Xiong, H Zhang, W Wang, Z Li
Journal of Microelectromechanical Systems 23 (5), 1025-1035, 2014
612014
Decay-based DRAM PUFs in commodity devices
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
IEEE Transactions on Dependable and Secure Computing 16 (3), 462-475, 2018
602018
Survey of transient execution attacks and their mitigations
W Xiong, J Szefer
ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021
502021
Fingerprinting cloud FPGA infrastructures
S Tian, W Xiong, I Giechaskiel, K Rasmussen, J Szefer
Proceedings of the 2020 ACM/SIGDA International Symposium on Field …, 2020
442020
Secure tlbs
S Deng, W Xiong, J Szefer
Proceedings of the 46th International Symposium on Computer Architecture …, 2019
412019
Analysis of secure caches using a three-step model for timing-based attacks
S Deng, W Xiong, J Szefer
Journal of Hardware and Systems Security 3 (4), 397-425, 2019
312019
Cache timing side-channel vulnerability checking with computation tree logic
S Deng, W Xiong, J Szefer
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
252018
A benchmark suite for evaluating caches' vulnerability to timing attacks
S Deng, W Xiong, J Szefer
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
232020
Ultrahigh-Q, largely deformed microcavities coupled by a free-space laser beam
L Shao, L Wang, W Xiong, XF Jiang, QF Yang, YF Xiao
Applied Physics Letters 103 (12), 2013
212013
Survey of transient execution attacks
W Xiong, J Szefer
arXiv preprint arXiv:2005.13435, 2020
202020
SecChisel framework for security verification of secure processor architectures
S Deng, D Gümüşoğlu, W Xiong, S Sari, YS Gener, C Lu, O Demir, ...
Proceedings of the 8th International Workshop on Hardware and Architectural …, 2019
192019
Intrinsic run-time row hammer PUFs: Leveraging the row hammer effect for run-time cryptography and improved security
NA Anagnostopoulos, T Arul, Y Fan, C Hatzfeld, A Schaller, W Xiong, ...
Cryptography 2 (3), 13, 2018
192018
Survey of Approaches for Security Verification of Hardware/Software Systems.
O Demir, W Xiong, F Zaghloul, J Szefer
IACR Cryptol. ePrint Arch. 2016, 846, 2016
192016
Characterization of mpc-based private inference for transformer-based models
Y Wang, GE Suh, W Xiong, B Lefaudeux, B Knott, M Annavaram, ...
2022 IEEE International Symposium on Performance Analysis of Systems and …, 2022
182022
Cloud FPGA cartography using PCIe contention
S Tian, I Giechaskiel, W Xiong, J Szefer
2021 IEEE 29th Annual International Symposium on Field-Programmable Custom …, 2021
172021
Spying on Temperature using DRAM
W Xiong, NA Anagnostopoulos, A Schaller, S Katzenbeisser, J Szefer
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE), 13-18, 2019
162019
Thermal covert channels leveraging package-on-package DRAM
S Chen, W Xiong, Y Xu, B Li, J Szefer
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
152019
The system can't perform the operation now. Try again later.
Articles 1–20