Fengwei Zhang
Fengwei Zhang
Associate Professor, Southern University of Science and Technology
Email verificata su sustech.edu.cn - Home page
Titolo
Citata da
Citata da
Anno
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
652013
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
592015
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014
542014
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
K Sun, J Wang, F Zhang, A Stavrou
522012
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
European Symposium on Research in Computer Security, 219-238, 2014
402014
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics
J Wang, F Zhang, K Sun, A Stavrou
342011
Ninja: Towards Transparent Tracing and Debugging on {ARM}
Z Ning, F Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 33-49, 2017
272017
SoK: A study of using hardware-assisted isolated execution environments for security
F Zhang, H Zhang
Proceedings of the Hardware and Architectural Support for Security and …, 2016
232016
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
222015
Temporal metrics for software vulnerabilities
JA Wang, F Zhang, M Xia
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
222008
A comparison study of intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
202018
Metrics for information security vulnerabilities
JA Wang, M Xia, F Zhang
Journal of Applied Global Research 1 (1), 48-58, 2008
202008
TrustLogin: Securing Password-Login on Commodity Operating Systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
162015
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
J Li, X Tong, F Zhang, J Ma
IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018
122018
Breaking BLE beacons for fun but mostly profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
122017
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage
K Leach, F Zhang, W Weimer
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
112017
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
112016
IOCheck: A framework to enhance the security of I/O devices at runtime
F Zhang
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
102013
Position paper: Challenges towards securing hardware-assisted execution environments
Z Ning, F Zhang, W Shi, W Shi
Proceedings of the Hardware and Architectural Support for Security and …, 2017
92017
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
72018
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20