Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019 | 450 | 2019 |
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 438 | 2017 |
Sgxpectre attacks: Leaking enclave secrets via speculative execution G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai arXiv preprint arXiv:1802.09085, 2018 | 154 | 2018 |
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin 2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018 | 95 | 2018 |
Differentially private access patterns for searchable symmetric encryption G Chen, TH Lai, MK Reiter, Y Zhang IEEE INFOCOM 2018-IEEE conference on computer communications, 810-818, 2018 | 77 | 2018 |
Crowd-ML: A privacy-preserving learning framework for a crowd of smart devices J Hamm, AC Champion, G Chen, M Belkin, D Xuan 2015 IEEE 35th International Conference on Distributed Computing Systems, 11-20, 2015 | 75 | 2015 |
Opera: Open remote attestation for intel's secure enclaves G Chen, Y Zhang, TH Lai Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 58 | 2019 |
Fingerprinting deep neural networks globally via universal adversarial perturbations Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022 | 53 | 2022 |
{MAGE}: Mutual attestation for a group of enclaves without trusted third parties G Chen, Y Zhang 31st USENIX Security Symposium (USENIX Security 22), 4095-4110, 2022 | 25 | 2022 |
On degrees of freedom of cognitive networks with user cooperation G Chen, Z Xiang, C Xu, M Tao IEEE Wireless Communications Letters 1 (6), 617-620, 2012 | 24 | 2012 |
Defeating speculative-execution attacks on SGX with HyperRace G Chen, M Li, F Zhang, Y Zhang 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 17 | 2019 |
Towards formal verification of state continuity for enclave programs MK Jangid, G Chen, Y Zhang, Z Lin 30th USENIX Security Symposium (USENIX Security 21), 573-590, 2021 | 15 | 2021 |
Mobile data collection frameworks: A survey PY Cao, G Li, G Chen, B Chen Proceedings of the 2015 Workshop on Mobile Big Data, 25-30, 2015 | 14 | 2015 |
Flash-Loc: Flashing mobile phones for accurate indoor localization F Yang, Q Zhai, G Chen, AC Champion, J Zhu, D Xuan IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 10 | 2016 |
Secure hierarchical deterministic wallet supporting stealth address X Yin, Z Liu, G Yang, G Chen, H Zhu European Symposium on Research in Computer Security, 89-109, 2022 | 8 | 2022 |
Reusable enclaves for confidential serverless computing S Zhao, P Xu, G Chen, M Zhang, Y Zhang, Z Lin 32nd USENIX Security Symposium (USENIX Security 23), 4015-4032, 2023 | 7 | 2023 |
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing W Wang, G Chen, Y Cheng, Y Zhang, Z Lin Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021 | 7 | 2021 |
SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution.(2018) G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai arXiv preprint arXiv:1802.09085, 2018 | 6 | 2018 |
RAI2: Responsible Identity Audit Governing the Artificial Intelligence. T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu NDSS, 2023 | 5 | 2023 |
EV-matching: Bridging large visual data and electronic data for efficient surveillance G Li, F Yang, G Chen, Q Zhai, X Li, J Teng, J Zhu, D Xuan, B Chen, ... 2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017 | 5 | 2017 |