Yangchun Fu

According to our database1, Yangchun Fu authored at least 15 papers between 2012 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

2016
Automatic Uncovering of Tap Points from Kernel Executions.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

Detecting Stack Layout Corruptions with Robust Stack Unwinding.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

2015
PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015

Automatically deriving pointer reference expressions from binary code for memory dump analysis.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Supporting Dynamic GPU Computing Result Reuse in the Cloud.
Proceedings of the 7th USENIX Workshop on Hot Topics in Cloud Computing, 2015

2014
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting.
IEEE Trans. Cloud Comput., 2014

HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management.
Proceedings of the 2014 USENIX Annual Technical Conference, 2014

Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
ACM Trans. Inf. Syst. Secur., 2013

EXTERIOR: using a dual-VM based external shell for guest-OS introspection, configuration, and recovery.
Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (co-located with ASPLOS 2013), 2013

Obfuscation resilient binary code reuse through trace-oriented programming.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

Subverting system authentication with context-aware, reactive virtual machine introspection.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

OS-Sommelier: memory-only operating system fingerprinting in the cloud.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012


  Loading...