Follow
Yue Chen
Yue Chen
Palo Alto Networks
Verified email at paloaltonetworks.com - Homepage
Title
Cited by
Cited by
Year
A novel chaos-based fragile watermarking for image tampering detection and self-recovery
Y Chen
Harbin Institute of Technology, 2011
158*2011
Remix: On-demand live randomization
Y Chen, Z Wang, D Whalley, L Lu
Proceedings of the sixth ACM conference on data and application security and …, 2016
1142016
Armlock: Hardware-based fault isolation for arm
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1092014
Value driven security threat modeling based on attack path analysis
Y Chen, B Boehm, L Sheppard
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
832007
{SecPod}: a Framework for Virtualization-based Security Systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
2015 USENIX Annual Technical Conference (USENIX ATC 15), 347-360, 2015
732015
Adaptive Android Kernel Live Patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
USENIX Security Symposium 2017, 2017
712017
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
642017
Design and implementation of SecPod, a framework for virtualization-based security systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017
552017
Adaptive intrusion response to minimize risk over multiple network attacks
S Tanachaiwiwat, K Hwang, Y Chen
ACM Trans on Information and System Security 19 (1-30), 95-96, 2002
472002
Pinpointing vulnerabilities
Y Chen, M Khandaker, Z Wang
Proceedings of the 2017 ACM on Asia conference on computer and …, 2017
412017
Method and system for detecting and correcting errors while accessing memory devices in microprocessor systems
Y Zhang, PY Lu, Y Chen
US Patent 7,334,179, 2008
312008
Stakeholder value driven threat modeling for off the shelf based systems
Y Chen, BW Boehm
29th International Conference on Software Engineering (ICSE'07 Companion), 91-92, 2007
282007
Secure in-cache execution
Y Chen, M Khandaker, Z Wang
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
242017
Method and system for codec with polyringer
Y Chen, N Sollenberger, M Wang
US Patent 7,653,204, 2010
202010
Adaptive Kernel Live Patching: An Open Collaborative Effort to Ameliorate Android N-day Root Exploits
T Zhang, Yulong and Chen, Yue and Bao, Chenfu and Xia, Liangzhao and Zhen ...
Black Hat USA 2016, 2016
152016
Wireless device having a hardware accelerator to support equalization processing
Y Chen
US Patent 7,643,549, 2010
132010
Measuring Security Investment Benefit for Off the Shelf Software Systems-A Stakeholder Value Driven Approach.
Y Chen, B Boehm, L Sheppard
WEIS, 2007
132007
Diesel Engine Fault Diagnosis Based on D-S Evidence Theory
L Tong, Y Chen, Z Wang, Q Qin
Science Technology and Engineering, 3749-3752, 2010
12*2010
Equalize training method using re-encoded bits and known training sequences
Y Chen, A Molev-Shteiman, A Heiman, NR Sollenberger, HH Zeng, ...
US Patent 7,903,728, 2011
72011
Edge incremental redundancy support in a cellular wireless terminal
LF Chang, NR Sollenberger, Y Wang, A Shohara, Y Chen
US Patent 7,366,254, 2008
42008
The system can't perform the operation now. Try again later.
Articles 1–20