Qingkai Zeng
Orcid: 0000-0002-0610-1553Affiliations:
- Nanjing University, Nanjing, China
According to our database1,
Qingkai Zeng
authored at least 34 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
2022
Int. J. Inf. Comput. Secur., 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Survey of CPU Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models, and Countermeasures.
Secur. Commun. Networks, 2021
SecPT: Providing Efficient Page Table Protection based on SMAP Feature in an Untrusted Commodity Kernel.
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
2019
Int. J. Inf. Comput. Secur., 2019
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Secur. Commun. Networks, 2018
Sci. China Inf. Sci., 2018
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018
2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware.
IET Inf. Secur., 2016
Proceedings of the 10th International Symposium on Theoretical Aspects of Software Engineering, 2016
IntEQ: recognizing benign integer overflows via equivalence checking across multiple precisions.
Proceedings of the 38th International Conference on Software Engineering, 2016
2015
Improving the Accuracy of Integer Signedness Error Detection Using Data Flow Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015
Efficient Dynamic Tracking Technique for Detecting Integer-Overflow-to-Buffer-Overflow Vulnerability.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Information Security - 17th International Conference, 2014
2012
A Security Assurance Framework Combining Formal Verification and Security Functional Testing.
Proceedings of the 2012 12th International Conference on Quality Software, 2012
2006
Proceedings of the Advances in Computer Science, 2006