Inferring fine-grained control flow inside {SGX} enclaves with branch shadowing S Lee, MW Shih, P Gera, T Kim, H Kim, M Peinado 26th USENIX Security Symposium (USENIX Security 17), 557-574, 2017 | 618 | 2017 |
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs. MW Shih, S Lee, T Kim, M Peinado NDSS, 2017 | 477 | 2017 |
SGX-shield: Enabling address space layout randomization for SGX programs. J Seo, B Lee, SM Kim, MW Shih, I Shin, D Han, T Kim NDSS, 2017 | 253 | 2017 |
S-nfv: Securing nfv states by using sgx MW Shih, M Kumar, T Kim, A Gavrilovska Proceedings of the 2016 ACM International Workshop on Security in Software …, 2016 | 152 | 2016 |
OpenSGX: An Open Platform for SGX Research. P Jain, SJ Desai, MW Shih, T Kim, SM Kim, JH Lee, C Choi, Y Shin, ... NDSS 16, 21-24, 2016 | 133 | 2016 |
Toward engineering a secure android ecosystem: A survey of existing techniques M Xu, C Song, Y Ji, MW Shih, K Lu, C Zheng, R Duan, Y Jang, B Lee, ... ACM Computing Surveys (CSUR) 49 (2), 1-47, 2016 | 110 | 2016 |
Fast, scalable and secure onloading of edge functions using airbox K Bhardwaj, MW Shih, P Agarwal, A Gavrilovska, T Kim, K Schwan 2016 IEEE/ACM Symposium on Edge Computing (SEC), 14-27, 2016 | 81 | 2016 |
Security impacts of virtualization on a network testbed YL Huang, B Chen, MW Shih, CY Lai 2012 IEEE Sixth International Conference on Software Security and …, 2012 | 38 | 2012 |
SPX: Preserving end-to-end security for edge computing K Bhardwaj, MW Shih, A Gavrilovska, T Kim, C Song arXiv preprint arXiv:1809.09038, 2018 | 8 | 2018 |
Securing Intel SGX against Side-channel Attacks via Load-time Synthesis. MW Shih Georgia Institute of Technology, Atlanta, GA, USA, 2020 | 5 | 2020 |
{PRIDWEN}: Universally Hardening {SGX} Programs via {Load-Time} Synthesis F Sang, MW Shih, S Lee, X Zhang, M Steiner, M Vij, T Kim 2022 USENIX Annual Technical Conference (USENIX ATC 22), 455-472, 2022 | 4 | 2022 |
An Anomaly Detection Module for Firefox OS B Chen, MW Shih, YL Huang 2014 IEEE Eighth International Conference on Software Security and …, 2014 | 4 | 2014 |
P2FAAS: Toward Privacy-Preserving Fuzzing as a Service F Sang, D Jang, MW Shih, T Kim arXiv preprint arXiv:1909.11164, 2019 | 1 | 2019 |