Protecting private keys against memory disclosure attacks using hardware transactional memory L Guan, J Lin, B Luo, J Jing, J Wang 2015 IEEE Symposium on Security and Privacy, 3-19, 2015 | 93 | 2015 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 67 | 2017 |
Copker: Computing with Private Keys without RAM. L Guan, J Lin, B Luo, J Jing NDSS, 23-26, 2014 | 53 | 2014 |
Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang 28th {USENIX} Security Symposium ({USENIX} Security 19), 1133-1150, 2019 | 33 | 2019 |
Discovering and understanding the security hazards in the interactions between IoT devices, mobile apps, and clouds on smart home platforms W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang 28th {USENIX} Security Symposium ({USENIX} Security 19), 1133-1150, 2019 | 32 | 2019 |
From physical to cyber: Escalating protection for personalized auto insurance L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016 | 15 | 2016 |
Method and system for protecting root CA certificate in a virtualization environment LIN Jingqiang, J Jing, G Le, B Li, J Wang, W Pan, Y Wang US Patent 9,819,496, 2017 | 10 | 2017 |
Supporting transparent snapshot for bare-metal malware analysis on mobile devices L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017 | 9 | 2017 |
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat mirai on iot devices C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang arXiv preprint arXiv:1706.05779, 2017 | 9 | 2017 |
Multi-core processor based key protection method and system LIN Jingqiang, G Le, J Wang, W Qiongxiao, J Jing, B Li US Patent 9,898,624, 2018 | 7 | 2018 |
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018 | 6 | 2018 |
Copker: a cryptographic engine against cold-boot attacks L Guan, J Lin, Z Ma, B Luo, L Xia, J Jing IEEE Transactions on Dependable and Secure Computing 15 (5), 742-754, 2016 | 6 | 2016 |
CryptMe: Data leakage prevention for unmodified programs on arm devices C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018 | 5 | 2018 |
Vcids: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles P Guo, H Kim, L Guan, M Zhu, P Liu International Conference on Security and Privacy in Communication Systems …, 2017 | 4 | 2017 |
Systematic assessment of cyber-physical security of energy management system for connected and automated electric vehicles L Guo, B Yang, J Ye, H Chen, F Li, WZ Song, L Du, L Guan IEEE Transactions on Industrial Informatics, 2020 | 3 | 2020 |
Key protecting method and apparatus LIN Jingqiang, G Le, W Qiongxiao, J Wang, J Jing US Patent 10,313,111, 2019 | 3 | 2019 |
Protecting mobile devices from physical memory attacks with targeted encryption L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia, B Luo Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 3 | 2019 |
Mimosa: Protecting private keys against memory disclosure attacks using hardware transactional memory C Li, L Guan, J Lin, B Luo, Q Cai, J Jing, J Wang IEEE Transactions on Dependable and Secure Computing, 2019 | 3 | 2019 |
Implementing a Covert Timing Channel Based on Mimic Function J Wang, L Guan, L Liu, D Zha International Conference on Information Security Practice and Experience …, 2014 | 3 | 2014 |
Good motive but bad design: Why ARM MPU has become an outcast in embedded systems W Zhou, L Guan, P Liu, Y Zhang arXiv preprint arXiv:1908.03638, 2019 | 2 | 2019 |