Yueqiang Cheng

Orcid: 0000-0002-6277-340X

According to our database1, Yueqiang Cheng authored at least 65 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Interface-Based Side Channel in TEE-Assisted Networked Services.
IEEE/ACM Trans. Netw., February, 2024

PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition.
IEEE Trans. Image Process., 2024

SoK: Rowhammer on Commodity Operating Systems.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Generating Robust DNN With Resistance to Bit-Flip Based Adversarial Weight Attack.
IEEE Trans. Computers, February, 2023

Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Adversarial Attacks on Adaptive Cruise Control Systems.
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023

2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022

Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency.
IEEE Trans. Dependable Secur. Comput., 2022

Making Information Hiding Effective Again.
IEEE Trans. Dependable Secur. Comput., 2022

A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM.
CoRR, 2022

Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation.
Comput. Secur., 2022

SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

CATTmew: Defeating Software-Only Physical Kernel Isolation.
IEEE Trans. Dependable Secur. Comput., 2021

AlphaFuzz: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search.
CoRR, 2021

Hermes Attack: Steal DNN Models with Lossless Inference Accuracy.
Proceedings of the 30th USENIX Security Symposium, 2021

CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.
Proceedings of the 30th USENIX Security Symposium, 2021

Performance-Enhanced Integrity Verification for Large Memories.
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021

SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

ModelShield: A Generic and Portable Framework Extension for Defending Bit-Flip based Adversarial Weight Attacks.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

Aion Attacks: Manipulating Software Timers in Trusted Execution Environment.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Exposing cache timing side-channel leaks through out-of-order symbolic execution.
Proc. ACM Program. Lang., 2020

GhostKnight: Breaching Data Integrity via Speculative Execution.
CoRR, 2020

PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Proceedings of the 29th USENIX Security Symposium, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

SpecuSym: speculative symbolic execution for cache timing leak detection.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

Super Root: A New Stealthy Rooting Technique on ARM Devices.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines.
CoRR, 2019

SvTPM: A Secure and Efficient vTPM in the Cloud.
CoRR, 2019

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

Defending against ROP Attacks with Nearly Zero Overhead.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Adaptive Call-Site Sensitive Control Flow Integrity.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Interface-Based Side Channel Attack Against Intel SGX.
CoRR, 2018

A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017

ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
PiBooster: Performance Accelerations in Page Table Management for Paravirtual VMs.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015

Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows.
ACM Trans. Inf. Syst. Secur., 2013

Guardian: Hypervisor as Security Foothold for Personal Computers.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

2012
Virtualization Based Password Protection against Malware in Untrusted Operating Systems.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

2011
DriverGuard: A Fine-Grained Protection on I/O Flows.
Proceedings of the Computer Security - ESORICS 2011, 2011

2009
Remote Attestation on Function Execution (Work-in-Progress).
Proceedings of the Trusted Systems, First International Conference, 2009


  Loading...