Jinpeng Wei
Jinpeng Wei
Verified email at uncc.edu - Homepage
Title
Cited by
Cited by
Year
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
3302009
Software persistent memory
J Guerra, L Mármol, D Campello, C Crespo, R Rangaswami, J Wei
Presented as part of the 2012 {USENIX} Annual Technical Conference ({USENIX …, 2012
882012
Bring your own device security issues and challenges
Y Wang, J Wei, K Vangury
2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), 80-85, 2014
862014
Viaf: Verification-based integrity assurance framework for mapreduce
Y Wang, J Wei
2011 IEEE 4th International Conference on Cloud Computing, 300-307, 2011
622011
TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study.
J Wei, C Pu
FAST 5, 12-12, 2005
562005
Soft-timer driven transient kernel control flow attacks and defense
J Wei, BD Payne, J Giffin, C Pu
2008 Annual Computer Security Applications Conference (ACSAC), 97-107, 2008
422008
A secure information flow architecture for web service platforms
J Wei, L Singaravelu, C Pu
IEEE Transactions on Services Computing 1 (2), 75-87, 2008
262008
Result integrity check for mapreduce computation on hybrid clouds
Y Wang, J Wei, M Srivatsa
2013 IEEE Sixth International Conference on Cloud Computing, 847-854, 2013
252013
A methodical defense against tocttou attacks: The edgi approach
C Pu, J Wei
Proceedings of the 2006 International Symposium on Secure Software Engineering, 2006
252006
IntegrityMR: Integrity assurance framework for big data analytics and management applications
Y Wang, J Wei, M Srivatsa, Y Duan, W Du
2013 IEEE International Conference on Big Data, 33-40, 2013
202013
Modeling the runtime integrity of cloud servers: a scoped invariant perspective
J Wei, C Pu, CV Rozas, A Rajan, F Zhu
Privacy and Security for Cloud Computing, 211-232, 2013
152013
Autonomous Cyber Deception
E Al-Shaer, J Wei, W Kevin, C Wang
Springer International Publishing, 2019
132019
Static analysis based invariant detection for commodity operating systems
F Zhu, J Wei
Computers & Security 43, 49-63, 2014
132014
Toward protecting control flow confidentiality in cloud-based computation
Y Wang, J Wei
Computers & Security 52, 106-127, 2015
122015
Multiprocessors may reduce system dependability under file-based race condition attacks
J Wei, C Pu
37th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2007
122007
An adaptive middleware design to support the dynamic interpretation of domain-specific models
KA Morris, M Allison, FM Costa, J Wei, PJ Clarke
Information and Software Technology 62, 21-41, 2015
112015
Dynamic bayesian games for adversarial and defensive cyber deception
L Huang, Q Zhu
Autonomous Cyber Deception, 75-97, 2019
102019
Toward integrity assurance of outsourced computing—a game theoretic perspective
Y Wang, J Wei, S Ren, Y Shen
Future Generation Computer Systems 55, 87-100, 2016
92016
System and method for preventing race condition vulnerability
C Pu, J Wei
US Patent 8,127,413, 2012
92012
Toward a general defense against kernel queue hooking attacks
J Wei, C Pu
computers & security 31 (2), 176-191, 2012
92012
The system can't perform the operation now. Try again later.
Articles 1–20