Yueqiang Cheng
Orcid: 0000-0002-6277-340X
According to our database1,
Yueqiang Cheng
authored at least 65 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE/ACM Trans. Netw., February, 2024
IEEE Trans. Image Process., 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Computers, February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of Cyber-Physical Systems and Internet of Things Week 2023, 2023
2022
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
CoRR, 2022
Comput. Secur., 2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 2021 International Symposium on Secure and Private Execution Environment Design (SEED), 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
ModelShield: A Generic and Portable Framework Extension for Defending Bit-Flip based Adversarial Weight Attacks.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
Proc. ACM Program. Lang., 2020
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines.
CoRR, 2019
CoRR, 2019
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018
Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
2012
Virtualization Based Password Protection against Malware in Untrusted Operating Systems.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
2011
Proceedings of the Computer Security - ESORICS 2011, 2011
2009
Proceedings of the Trusted Systems, First International Conference, 2009