Wenbo Shen

Orcid: 0000-0003-2899-6121

According to our database1, Wenbo Shen authored at least 55 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels.
IEEE Trans. Dependable Secur. Comput., 2024

Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense.
IEEE Trans. Dependable Secur. Comput., 2024

Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems.
CoRR, 2024

DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

LightZone: Lightweight Hardware-Assisted In-Process Isolation for ARM64.
Proceedings of the 25th International Middleware Conference, 2024

Bugs in Pods: Understanding Bugs in Container Runtime Systems.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Proceedings of the Computer Security - ESORICS 2024, 2024

CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Automatic Permission Check Analysis for Linux Kernel.
IEEE Trans. Dependable Secur. Comput., 2023

Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Proceedings of the 32nd USENIX Security Symposium, 2023

A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023

Demystifying Pointer Authentication on Apple M1.
Proceedings of the 32nd USENIX Security Symposium, 2023

Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

VDom: Fast and Unlimited Virtual Domains on Multiple Architectures.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot.
CoRR, 2022

OPEC: operation-based security isolation for bare-metal embedded systems.
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022

RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
KALD: Detecting Direct Pointer Disclosure Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2021

Security Challenges in the Container Cloud.
Proceedings of the 3rd IEEE International Conference on Trust, 2021

FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Revisiting challenges for selective data protection of real applications.
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021

2020
PESC: A Per System-Call Stack Canary Design for Linux Kernel.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019

PeX: A Permission Check Analysis Framework for Linux Kernel.
Proceedings of the 28th USENIX Security Symposium, 2019

Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop.
Proceedings of the Fourth International Workshop on Social Sensing, 2019

PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2017
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks.
IEEE Trans. Mob. Comput., 2017

Indoor positioning tracking with magnetic field and improved particle filter.
Int. J. Distributed Sens. Networks, 2017

NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Toward Proper Guard Zones for Link Signature.
IEEE Trans. Wirel. Commun., 2016

Flint Water Crisis: Data-Driven Risk Assessment Via Residential Water Testing.
CoRR, 2016

Data Science in Service of Performing Arts: Applying Machine Learning to Predicting Audience Preferences.
CoRR, 2016

SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
Parallel Stimulus Generation Based on Model Checking for Coherence Protocol Verification.
IEEE Trans. Very Large Scale Integr. Syst., 2015

No time to demodulate - fast physical layer verification of friendly jamming.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014

Channel correlation modeling for link signature security assessment.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

The security of link signature: A view from channel models.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Is link signature dependable for wireless security?
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2010
An FPGA Based Hybrid Processor Emulation Platform.
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010

2009
High-performance, energy-efficient platforms using in-socket FPGA accelerators.
Proceedings of the ACM/SIGDA 17th International Symposium on Field Programmable Gate Arrays, 2009

2007
Design of IP Media Accelerator.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007


  Loading...