Fengwei Zhang

Orcid: 0000-0003-3365-2526

According to our database1, Fengwei Zhang authored at least 92 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SnapMem: Hardware/Software Cooperative Memory Resistant to Cache-Related Attacks on ARM-FPGA Embedded SoC.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., October, 2024

Armor: Protecting Software Against Hardware Tracing Techniques.
IEEE Trans. Inf. Forensics Secur., 2024

Hardware-Assisted Live Kernel Function Updating on Intel Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

Building a Lightweight Trusted Execution Environment for Arm GPUs.
IEEE Trans. Dependable Secur. Comput., 2024

DTD: Comprehensive and Scalable Testing for Debuggers.
Proc. ACM Softw. Eng., 2024

Demystifying the DAO Governance Process.
CoRR, 2024

Syntactic Ghost: An Imperceptible General-purpose Backdoor Attacks on Pre-trained Language Models.
CoRR, 2024

MOAT: Towards Safe BPF Kernel Extension.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: A Comparison Study of Arm TrustZone and CCA.
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024

Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

CAGE: Complementing Arm CCA with GPU Extensions.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management.
Proceedings of the 57th IEEE/ACM International Symposium on Microarchitecture, 2024

FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage.
Proceedings of the Computer Security - ESORICS 2024, 2024

BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

TATOO: A Flexible Hardware Platform for Binary-Only Fuzzing.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

The HitchHiker's Guide to High-Assurance System Observability Protection with Efficient Permission Switches.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

ESem: To Harden Process Synchronization for Servers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Numerical analyses ridge-forming for whole film-mulching and double ridge-furrow, a discrete element method.
Comput. Electron. Agric., December, 2023

Revisiting ARM Debugging Features: Nailgun and its Defense.
IEEE Trans. Dependable Secur. Comput., 2023

Calibration of DEM models for fertilizer particles based on numerical simulations and granular experiments.
Comput. Electron. Agric., 2023

SHELTER: Extending Arm CCA with Isolation in User Space.
Proceedings of the 32nd USENIX Security Symposium, 2023

RingGuard: Guard io_uring with eBPF.
Proceedings of the 1st Workshop on eBPF and Kernel Extensions, 2023

Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaborating Flush Instructions and Timers on ARMv8-A.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network.
IEEE Trans. Dependable Secur. Comput., 2022

Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and DoS-resistant Consensus for Permissioned Blockchains.
Perform. Evaluation, 2022

Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J., 2022

STC-IDS: Spatial-temporal correlation feature analyzing based intrusion detection system for intelligent connected vehicles.
Int. J. Intell. Syst., 2022

STC-IDS: Spatial-Temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles.
CoRR, 2022

SOTER: Guarding Black-box Inference for General Neural Networks at the Edge.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Smile: Secure Memory Introspection for Live Enclave.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

RetTag: hardware-assisted return address integrity on RISC-V.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022

Raven: a novel kernel debugging tool on RISC-V.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

StrongBox: A GPU TEE on Arm Endpoints.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Speedster: An Efficient Multi-party State Channel via Enclaves.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM".
IEEE Trans. Inf. Forensics Secur., 2021

A Coprocessor-Based Introspection Framework Via Intel Management Engine.
IEEE Trans. Dependable Secur. Comput., 2021

Speedster: A TEE-assisted State Channel System.
CoRR, 2021

Classification and Recognition of Fish Farming by Extraction New Features to Control the Economic Aquatic Product.
Complex., 2021

Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

BADUSB-C: Revisiting BadUSB with Type-C.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

A Novel Memory Management for RISC-V Enclaves.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021

BadUSB-C: Revisiting BadUSB with Type-C.
Proceedings of the ASSS '21: Proceedings of the 2021 International Symposium on Advanced Security on Software and Systems, 2021

2020
An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles.
IEEE Trans. Intell. Veh., 2020

RansomSpector: An introspection-based approach to detect crypto ransomware.
Comput. Secur., 2020

HART: Hardware-Assisted Kernel Module Tracing on Arm.
Proceedings of the Computer Security - ESORICS 2020, 2020

KShot: Live Kernel Patching with SMM and SGX.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OS.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

Uranus: Simple, Efficient SGX Programming and its Applications.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under Deadline Constraints.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
Hardware-Assisted Transparent Tracing and Debugging on ARM.
IEEE Trans. Inf. Forensics Secur., 2019

Understanding the Security of ARM Debugging Features.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

A Study of the Multiple Sign-in Feature in Web Applications.
Proceedings of the Security and Privacy in Communication Networks, 2019

Target-Based Attention Model for Aspect-Level Sentiment Analysis.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Nighthawk: Transparent System Introspection from Ring -3.
Proceedings of the Computer Security - ESORICS 2019, 2019

Understanding the Security of Traffic Signal Infrastructure.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

Defeating Speculative-Execution Attacks on SGX with HyperRace.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

SecDATAVIEW: a secure big data workflow management system for heterogeneous computing environments.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels.
IEEE Trans. Inf. Forensics Secur., 2018

Towards Transparent Debugging.
IEEE Trans. Dependable Secur. Comput., 2018

SADUS: Secure data deletion in user space for mobile devices.
Comput. Secur., 2018

User-friendly deniable storage for mobile devices.
Comput. Secur., 2018

A comparison study of intel SGX and AMD memory encryption technology.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms.
Proceedings of the 2018 IEEE/ACM Symposium on Edge Computing, 2018

DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Ninja: Towards Transparent Tracing and Debugging on ARM.
Proceedings of the 26th USENIX Security Symposium, 2017

Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications.
Proceedings of the 2017 IEEE SmartWorld, 2017

Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments.
Proceedings of the Hardware and Architectural Support for Security and Privacy, 2017

Breaking BLE Beacons For Fun But Mostly Profit.
Proceedings of the 10th European Workshop on Systems Security, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

COMS: Customer Oriented Migration Service.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Towards Transparent Introspection.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security.
Proceedings of the Hardware and Architectural Support for Security and Privacy 2016, 2016

2015
Using Hardware Features for Increased Debugging Transparency.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Class-Chord: Efficient Messages to Classes of Nodes in Chord.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

TrustLogin: Securing Password-Login on Commodity Operating Systems.
Proceedings of the 10th ACM Symposium on Information, 2015

MobiPluto: File System Friendly Deniable Storage for Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
HyperCheck: A Hardware-AssistedIntegrity Monitor.
IEEE Trans. Dependable Secur. Comput., 2014

A Framework to Secure Peripherals at Runtime.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
SPECTRE: A dependable introspection framework via System Management Mode.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

IOCheck: A framework to enhance the security of I/O devices at runtime.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

2012
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

An edge-based adaptive image interpolation and its VLSI architecture.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2012

2011
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2008
Temporal metrics for software vulnerabilities.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008


  Loading...