Zhongshu Gu

Orcid: 0000-0001-9624-2669

According to our database1, Zhongshu Gu authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Intel TDX Demystified: A Top-Down Approach.
ACM Comput. Surv., September, 2024

SeaK: Rethinking the Design of a Secure Allocator for OS Kernel.
Proceedings of the 33rd USENIX Security Symposium, 2024

GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2021
A Study on the Security Implications of Information Leakages in Container Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Separation of Powers in Federated Learning.
CoRR, 2021

Separation of Powers in Federated Learning (Poster Paper).
Proceedings of the ResilientFL '21: Proceedings of the First Workshop on Systems Challenges in Reliable and Secure Federated Learning, 2021

Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation.
IEEE Trans. Dependable Secur. Comput., 2020

Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Reaching Data Confidentiality and Model Accountability on the CalTrain.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Houdini's Escape: Breaking the Resource Rein of Linux Control Groups.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution.
CoRR, 2018

Gemini: Guest-transparent honey files via hypervisor-level access redirection.
Comput. Secur., 2018

Security Namespace: Making Linux Security Frameworks Available to Containers.
Proceedings of the 27th USENIX Security Symposium, 2018

Securing Real-Time Microcontroller Systems through Customized Memory View Switching.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Protecting Intellectual Property of Deep Neural Networks with Watermarking.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Understanding the Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Privacy Implications of DNSSEC Look-Aside Validation.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
vMocity: Traveling VMs Across Heterogeneous Clouds.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

HERCULE: attack story reconstruction via community discovery on correlated log graph.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Securing Virtualized System via Active Protection
PhD thesis, 2015

LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

GUITAR: Piecing Together Android App GUIs from Memory Images.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
DRIP: A framework for purifying trojaned kernel drivers.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2011
Process Implanting: A New Active Introspection Framework for Virtualization.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011


  Loading...