Zhang Xu
Zhang Xu
Email verificata su email.wm.edu
TitoloCitata daAnno
Whispers in the hyper-space: high-bandwidth and reliable covert channel attacks inside the cloud
Z Wu, Z Xu, H Wang
IEEE/ACM Transactions on Networking 23 (2), 603-615, 2014
2692014
A measurement study on co-residence threat inside the cloud
Z Xu, H Wang, Z Wu
24th {USENIX} Security Symposium ({USENIX} Security 15), 929-944, 2015
722015
Security implications of memory deduplication in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systemsá…, 2013
582013
Power Attack: An Increasing Threat to Data Centers.
Z Xu, H Wang, Z Xu, X Wang
NDSS, 2014
462014
High fidelity data reduction for big data security dependency analyses
Z Xu, Z Wu, Z Li, K Jee, J Rhee, X Xiao, F Xu, H Wang, G Jiang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
422016
A covert channel construction in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
Proceedings of the 2012 ACM conference on Computer and communicationsá…, 2012
252012
Reduced Cooling Redundancy: A New Security Vulnerability in a Hot Data Center.
X Gao, Z Xu, H Wang, L Li, X Wang
NDSS, 2018
132018
Why some like it hot too: Thermal attack on data centers
X Gao, Z Xu, H Wang, L Li, X Wang
ACM SIGMETRICS Performance Evaluation Review 45 (1), 23-24, 2017
62017
Gemini: An Emergency Line of Defense against Phishing Attacks
Z Xu, H Wang, S Jajodia
2014 IEEE 33rd International Symposium on Reliable Distributed Systems, 11-20, 2014
52014
Intrusion detection using efficient system dependency analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,462, 2017
42017
Whispers in the Hyper-space: High-bandwidth and Reliable Covert Channel Attacks inside the Cloud
Z Wu, Z Xu, H Wang
IEEE/ACM TRANSACTIONS ON NETWORKING, 1, 2013
12013
High Fidelity Data Reduction for System Dependency Analysis
Z Wu, LI Zhichun, J Rhee, F Xu, G Jiang, K Jee, X Xiao, Z Xu
US Patent App. 15/416,346, 2017
2017
Understanding Security Threats in Cloud
Z Xu
2016
June 28, 2015
Z Xu, H Wang, Z Wu
2015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–14