Yinqian Zhang
Yinqian Zhang
Bestätigte E-Mail-Adresse bei cse.ohio-state.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of CCS, 2012
7832012
Homealone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
3642011
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2942014
The security of modern password expiration: An algorithmic framework and empirical analysis
Y Zhang, F Monrose, MK Reiter
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2042010
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud
Y Zhang, MK Reiter
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1992013
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1522017
A placement vulnerability study in multi-tenant public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th {USENIX} Security Symposium ({USENIX} Security 15), 913-928, 2015
1352015
Detecting privileged side-channel attacks in shielded execution with Déjá Vu
S Chen, X Zhang, MK Reiter, Y Zhang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
1242017
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 {USENIX} Annual Technical Conference ({USENIX}{ATC} 18), 133-146, 2018
1212018
One bit flips, one cloud flops: Cross-vm row hammer attacks and privilege escalation
Y Xiao, X Zhang, Y Zhang, R Teodorescu
25th {USENIX} Security Symposium ({USENIX} Security 16), 19-35, 2016
1172016
A software approach to defeating side channels in last-level caches
Z Zhou, MK Reiter, Y Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1042016
Cloudradar: A real-time side-channel attack detection system in clouds
T Zhang, Y Zhang, RB Lee
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
1042016
SgxPectre: Stealing Intel secrets from SGX enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
652019
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
452018
Return-oriented flush-reload side channels on arm and their implications for android devices
X Zhang, Y Xiao, Y Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
452016
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
Y Gu, Q Zhao, Y Zhang, Z Lin
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
362017
Mitigating storage side channels using statistical privacy mechanisms
Q Xiao, MK Reiter, Y Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
322015
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
282018
Stacco: Differentially analyzing side-channel traces for detecting SSL/TLS vulnerabilities in secure enclaves
Y Xiao, M Li, S Chen, Y Zhang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
282017
Cybersecurity for digital manufacturing
D Wu, A Ren, W Zhang, F Fan, P Liu, X Fu, J Terpenny
Journal of manufacturing systems 48, 3-12, 2018
262018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20