Xinyang Ge
Xinyang Ge
Microsoft Research
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014
Fine-grained control-flow integrity for kernel software
X Ge, N Talele, M Payer, T Jaeger
Proceedings of the 1st IEEE European Symposium on Security and Privacy, 179-194, 2016
Griffin: Guarding control flows using intel processor trace
X Ge, W Cui, T Jaeger
Proceedings of the 22nd ACM International Conference on Architectural …, 2017
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
REPT: Reverse Debugging of Failures in Deployed Software
W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun
Proceedings of the 13th USENIX Symposium on Operating Systems Design and …, 2018
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
H Vijayakumar, X Ge, M Payer, T Jaeger
Proceedings of the 23rd USENIX Security Symposium, 973-988, 2014
A new prediction approach based on linear regression for collaborative filtering
X Ge, J Liu, Q Qi, Z Chen
Proceedings of the 8th International Conference on Fuzzy Systems and …, 2011
{PARTEMU}: Enabling Dynamic Analysis of Real-World TrustZone Software Using Emulation
L Harrison, H Vijayakumar, R Padhye, K Sen, M Grace
29th {USENIX} Security Symposium ({USENIX} Security 20), 789-806, 2020
An evil copy: How the loader betrays you
X Ge, M Payer, T Jaeger
Proceedings of the 21st Network and Distributed System Security Symposium 15, 2017
Lazy Diagnosis of In-Production Concurrency Bugs
B Kasikci, W Cui, X Ge, B Niu
Proceedings of the 26th Symposium on Operating Systems Principles, 582-598, 2017
Pileus: Protecting user resources from vulnerable cloud services
Y Sun, G Petracca, X Ge, T Jaeger
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer
T Jaeger, X Ge, D Muthukumaran, S Rueda, J Schiffman, H Vijayakumar
International Conference on Security, Privacy, and Applied Cryptography …, 2015
Reverse debugging of software failures
W Cui, X Ge, BCC Kasikci, B Niu, R Wang, I Yun
US Patent 10,565,511, 2020
Reverse Debugging of Kernel Failures in Deployed Systems
X Ge, B Niu, W Cui
2020 {USENIX} Annual Technical Conference ({USENIX}{ATC} 20), 281-292, 2020
Enforcing Execution Integrity for Software Systems
X Ge
Policy models to protect resource retrieval
H Vijayakumar, X Ge, T Jaeger
Proceedings of the 19th ACM symposium on Access control models and …, 2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–17