Wenhao Wang
Orcid: 0000-0001-7566-2322Affiliations:
- Chinese Academy of Sciences, SKLOIS, Institute of Information Engineering, Beijing, China
According to our database1,
Wenhao Wang
authored at least 46 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium.
IEEE Trans. Inf. Forensics Secur., 2024
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems.
CoRR, 2024
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024
ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Circuits Syst. II Express Briefs, 2022
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Constructive Use of Process Variations: Reconfigurable and High-Resolution Delay-Line.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IEEE Trans. Circuits Syst., 2020
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the Advances in Information and Computer Security, 2018
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2013
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation".
Cryptogr. Commun., 2013
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011