Wenhao Wang

Orcid: 0000-0001-7566-2322

Affiliations:
  • Chinese Academy of Sciences, SKLOIS, Institute of Information Engineering, Beijing, China


According to our database1, Wenhao Wang authored at least 46 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium.
IEEE Trans. Inf. Forensics Secur., 2024

The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems.
CoRR, 2024

Cabin: Confining Untrusted Programs within Confidential VMs.
CoRR, 2024

NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs.
CoRR, 2024

Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection.
Proceedings of the 33rd USENIX Security Symposium, 2024

SegScope: Probing Fine-grained Interrupts via Architectural Footprints.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

Verifying Rust Implementation of Page Tables in a Software Enclave Hypervisor.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
IEEE Trans. Dependable Secur. Comput., 2023

virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone.
CoRR, 2023

The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel Leakages.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CRAlert: Hardware-Assisted Code Reuse Attack Detection.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

HyperEnclave: An Open and Cross-platform Trusted Execution Environment.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

2021
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Understanding TEE Containers, Easy to Use? Hard to Trust.
CoRR, 2021

Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

A Survey of Recent Attacks and Mitigation on FPGA Systems.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2021

Practical and Efficient in-Enclave Verification of Privacy Compliance.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

Constructive Use of Process Variations: Reconfigurable and High-Resolution Delay-Line.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

2020
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology.
IEEE Trans. Circuits Syst., 2020

Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR, 2020

Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

A Privacy-Preserving-Oriented DNN Pruning and Mobile Acceleration Framework.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019

Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019

2018
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
IACR Cryptol. ePrint Arch., 2018

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.
Proceedings of the Advances in Information and Computer Security, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Binary Code Retrofitting and Hardening Using SGX.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Notes on Rainbow Distinguished Point Method.
CoRR, 2015

Searching cubes for testing Boolean functions and its application to Trivium.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2013
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation".
Cryptogr. Commun., 2013

Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications.
Proceedings of the Information and Communications Security - 13th International Conference, 2011


  Loading...