Hypercheck: A hardware-assistedintegrity monitor F Zhang, J Wang, K Sun, A Stavrou IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014 | 286 | 2014 |
A comparison study of intel SGX and AMD memory encryption technology S Mofrad, F Zhang, S Lu, W Shi Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018 | 125 | 2018 |
Using hardware features for increased debugging transparency F Zhang, K Leach, A Stavrou, H Wang, K Sun 2015 IEEE Symposium on Security and Privacy, 55-69, 2015 | 101 | 2015 |
Spectre: A dependable introspection framework via system management mode F Zhang, K Leach, K Sun, A Stavrou 2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013 | 99 | 2013 |
Ninja: Towards Transparent Tracing and Debugging on {ARM} Z Ning, F Zhang 26th USENIX Security Symposium (USENIX Security 17), 33-49, 2017 | 67 | 2017 |
SoK: A study of using hardware-assisted isolated execution environments for security F Zhang, H Zhang Proceedings of the Hardware and Architectural Support for Security and …, 2016 | 60 | 2016 |
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes K Sun, J Wang, F Zhang, A Stavrou | 59 | 2012 |
A framework to secure peripherals at runtime F Zhang, H Wang, K Leach, A Stavrou Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 58 | 2014 |
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics J Wang, F Zhang, K Sun, A Stavrou | 51 | 2011 |
RansomSpector: An introspection-based approach to detect crypto ransomware F Tang, B Ma, J Li, F Zhang, J Su, J Ma Computers & Security 97, 101997, 2020 | 48 | 2020 |
Understanding the security of arm debugging features Z Ning, F Zhang 2019 IEEE Symposium on Security and Privacy (SP), 602-619, 2019 | 45 | 2019 |
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels J Li, X Tong, F Zhang, J Ma IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018 | 44 | 2018 |
Position paper: Challenges towards securing hardware-assisted execution environments Z Ning, F Zhang, W Shi, W Shi Proceedings of the Hardware and Architectural Support for Security and …, 2017 | 44 | 2017 |
MobiPluto: File System Friendly Deniable Storage for Mobile Devices B Chang, Z Wang, B Chen, F Zhang Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 40 | 2015 |
Metrics for information security vulnerabilities JA Wang, M Xia, F Zhang Journal of Applied Global Research 1 (1), 48-58, 2008 | 35 | 2008 |
Temporal metrics for software vulnerabilities JA Wang, F Zhang, M Xia Proceedings of the 4th annual workshop on Cyber security and information …, 2008 | 30 | 2008 |
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018 | 29 | 2018 |
Happer: Unpacking Android Apps via a Hardware-Assisted Approach L Xue, H Zhou, X Luo, Y Zhou, Y Shi, G Gu, F Zhang, MH Au 2021 IEEE Symposium on Security and Privacy (SP), 1641-1658, 2021 | 28 | 2021 |
Uranus: Simple, efficient sgx programming and its applications J Jiang, X Chen, TO Li, C Wang, T Shen, S Zhao, H Cui, CL Wang, ... Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020 | 28 | 2020 |
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms Z Ning, J Liao, F Zhang, W Shi 2018 IEEE/ACM Symposium on Edge Computing (SEC), 421-426, 2018 | 28 | 2018 |