{GridGraph}:{Large-Scale} graph processing on a single machine using 2-level hierarchical partitioning X Zhu, W Han, W Chen 2015 USENIX Annual Technical Conference (USENIX ATC 15), 375-386, 2015 | 444 | 2015 |
Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection Y Fu, Z Lin 2012 IEEE symposium on security and privacy, 586-600, 2012 | 271 | 2012 |
Obfuscation resilient binary code reuse through trace-oriented programming J Zeng, Y Fu, KA Miller, Z Lin, X Zhang, D Xu Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 88 | 2013 |
Exterior: Using a dual-vm based external shell for guest-os introspection, configuration, and recovery Y Fu, Z Lin Acm Sigplan Notices 48 (7), 97-110, 2013 | 83 | 2013 |
Sgx-Lapd: Thwarting Controlled Side Channel Attacks via Enclave Verifiable Page Faults Y Fu, E Bauman, R Quinonez, Z Lin Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 67 | 2017 |
Hybrid-bridge: Efficiently bridging the semantic gap in virtual machine introspection via decoupled execution and training memoization A Saberi, Y Fu, Z Lin Proceedings of the 21st annual network and distributed system security …, 2014 | 60 | 2014 |
Bridging the semantic gap in virtual machine introspection via online kernel data redirection Y Fu, Z Lin ACM Transactions on Information and System Security (TISSEC) 16 (2), 1-29, 2013 | 53 | 2013 |
{HYPERSHELL}: A Practical Hypervisor Layer Guest {OS} Shell for Automated {In-VM} Management Y Fu, J Zeng, Z Lin 2014 USENIX annual technical conference (USENIX ATC 14), 85-96, 2014 | 49 | 2014 |
Os-sommelier: Memory-only operating system fingerprinting in the cloud Y Gu, Y Fu, A Prakash, Z Lin, H Yin Proceedings of the Third ACM Symposium on Cloud Computing, 1-13, 2012 | 47 | 2012 |
Automatically bridging the semantic gap in machine introspection Z Lin, Y Fu US Patent 9,529,614, 2016 | 43 | 2016 |
Pemu: A pin highly compatible out-of-vm dynamic binary instrumentation framework J Zeng, Y Fu, Z Lin Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015 | 42 | 2015 |
Multi-aspect, robust, and memory exclusive guest os fingerprinting Y Gu, Y Fu, A Prakash, Z Lin, H Yin IEEE Transactions on Cloud Computing 2 (4), 380-394, 2014 | 26 | 2014 |
Transparent detection and extraction of return-oriented-programming attacks J Rhee, Y Fu, Z Wu, H Zhang, LI Zhichun, G Jiang US Patent 9,904,780, 2018 | 15 | 2018 |
Automatically deriving pointer reference expressions from binary code for memory dump analysis Y Fu, Z Lin, D Brumley Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 14 | 2015 |
Supporting dynamic {GPU} computing result reuse in the cloud H Zhou, Y Fu, C Liu 7th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 15), 2015 | 10 | 2015 |
Subverting system authentication with context-aware, reactive virtual machine introspection Y Fu, Z Lin, KW Hamlen Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 10 | 2013 |
Automatic uncovering of tap points from kernel executions J Zeng, Y Fu, Z Lin Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 9 | 2016 |
Detecting stack layout corruptions with robust stack unwinding Y Fu, J Rhee, Z Lin, Z Li, H Zhang, G Jiang Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 4 | 2016 |
Bridging the semantic gap in virtual machine introspection via binary code reuse Y Fu The University of Texas at Dallas, 2016 | 4 | 2016 |
PEMU J Zeng, Y Fu, Z Lin Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015 | | 2015 |