Seguir
Fengwei Zhang
Fengwei Zhang
Associate Professor, Southern University of Science and Technology
Dirección de correo verificada de sustech.edu.cn - Página principal
Título
Citado por
Citado por
Año
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014
2852014
A comparison study of intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
1192018
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
1012015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
982013
Ninja: Towards Transparent Tracing and Debugging on {ARM}
Z Ning, F Zhang
26th USENIX Security Symposium (USENIX Security 17), 33-49, 2017
652017
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
K Sun, J Wang, F Zhang, A Stavrou
602012
SoK: A study of using hardware-assisted isolated execution environments for security
F Zhang, H Zhang
Proceedings of the Hardware and Architectural Support for Security and …, 2016
562016
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
562014
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics
J Wang, F Zhang, K Sun, A Stavrou
512011
Understanding the security of arm debugging features
Z Ning, F Zhang
2019 IEEE Symposium on Security and Privacy (SP), 602-619, 2019
442019
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma
Computers & Security 97, 101997, 2020
432020
Position paper: Challenges towards securing hardware-assisted execution environments
Z Ning, F Zhang, W Shi, W Shi
Proceedings of the Hardware and Architectural Support for Security and …, 2017
422017
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
J Li, X Tong, F Zhang, J Ma
IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018
412018
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
382015
Metrics for information security vulnerabilities
JA Wang, M Xia, F Zhang
Journal of Applied Global Research 1 (1), 48-58, 2008
332008
Temporal metrics for software vulnerabilities
JA Wang, F Zhang, M Xia
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
292008
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
272018
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
Z Ning, J Liao, F Zhang, W Shi
2018 IEEE/ACM Symposium on Edge Computing (SEC), 421-426, 2018
262018
Happer: Unpacking Android Apps via a Hardware-Assisted Approach
L Xue, H Zhou, X Luo, Y Zhou, Y Shi, G Gu, F Zhang, MH Au
2021 IEEE Symposium on Security and Privacy (SP), 1641-1658, 2021
252021
Uranus: Simple, efficient sgx programming and its applications
J Jiang, X Chen, TO Li, C Wang, T Shen, S Zhao, H Cui, CL Wang, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
252020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20