Zhe Wang

Orcid: 0000-0003-4719-1804

Affiliations:
  • University of Chinese Academy of Sciences, Institute of Computing Technology, Huairou, Beijing, China


According to our database1, Zhe Wang authored at least 21 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64.
Proceedings of the 33rd USENIX Security Symposium, 2024

OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers.
Proceedings of the 33rd USENIX Security Symposium, 2024

A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications.
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024

CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024

Enhancing Learning-Based Binary Code Similarity Detection Model through Adversarial Training with Multiple Function Variants.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

2023
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware.
IEEE Trans. Dependable Secur. Comput., 2023

SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques.
Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization, 2023

PANIC: PAN-assisted Intra-process Memory Isolation on ARM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Making Information Hiding Effective Again.
IEEE Trans. Dependable Secur. Comput., 2022

FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods.
CoRR, 2022

Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths.
Proceedings of the 31st USENIX Security Symposium, 2022

SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Using Local Clocks to Reproduce Concurrency Bugs.
IEEE Trans. Software Eng., 2018

2017
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

2015
HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015


  Loading...