Wenbo Shen
Orcid: 0000-0003-2899-6121
According to our database1,
Wenbo Shen
authored at least 53 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems.
CoRR, 2024
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Proceedings of the Computer Security - ESORICS 2024, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Proceedings of the 32nd USENIX Security Symposium, 2023
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023
2022
CoRR, 2022
Proceedings of the EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5, 2022
RegVault: hardware assisted selective data randomization for operating system kernels.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the 3rd IEEE International Conference on Trust, 2021
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the APSys '21: 12th ACM SIGOPS Asia-Pacific Workshop on Systems, 2021
2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Fourth International Workshop on Social Sensing, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2017
IEEE Trans. Mob. Comput., 2017
Int. J. Distributed Sens. Networks, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
CoRR, 2016
Data Science in Service of Performing Arts: Applying Machine Learning to Predicting Audience Preferences.
CoRR, 2016
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016
2015
Parallel Stimulus Generation Based on Model Checking for Coherence Protocol Verification.
IEEE Trans. Very Large Scale Integr. Syst., 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
2014
Where are you from?: confusing location distinction using virtual multipath camouflage.
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2010
Proceedings of the International Conference on Field Programmable Logic and Applications, 2010
2009
Proceedings of the ACM/SIGDA 17th International Symposium on Field Programmable Gate Arrays, 2009
2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007