ROPecker: A generic and practical approach for defending against ROP attack Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng Internet Society, 2014 | 403 | 2014 |
Hermes attack: Steal {DNN} models with lossless inference accuracy Y Zhu, Y Cheng, H Zhou, Y Lu 30th USENIX Security Symposium (USENIX Security 21), 2021 | 108 | 2021 |
{PCKV}: Locally differentially private correlated {Key-Value} data collection with optimized utility X Gu, M Li, Y Cheng, L Xiong, Y Cao 29th USENIX security symposium (USENIX security 20), 967-984, 2020 | 75 | 2020 |
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ... IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020 | 69 | 2020 |
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020 | 63 | 2020 |
{CIPHERLEAKS}: Breaking Constant-time Cryptography on {AMD}{SEV} via the Ciphertext Side Channel M Li, Y Zhang, H Wang, K Li, Y Cheng 30th USENIX Security Symposium (USENIX Security 21), 717-732, 2021 | 60 | 2021 |
COIN attacks: On insecurity of enclave untrusted interfaces in SGX MR Khandaker, Y Cheng, Z Wang, T Wei Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020 | 60 | 2020 |
Continuous release of data streams under both centralized and local differential privacy T Wang, JQ Chen, Z Zhang, D Su, Y Cheng, Z Li, N Li, S Jha Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 55 | 2021 |
SpecuSym: Speculative symbolic execution for cache timing leak detection S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu, Z Zuo Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 55 | 2020 |
Dramdig: A knowledge-assisted tool to uncover dram address mapping M Wang, Z Zhang, Y Cheng, S Nepal 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 46 | 2020 |
Efficient virtualization-based application protection against untrusted operating system Y Cheng, X Ding, RH Deng Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015 | 43 | 2015 |
Poster: Rust sgx sdk: Towards memory safety in intel sgx enclave Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 42 | 2017 |
Data transmission with obfuscation for a data processing (DP) accelerator Y Cheng, H Zhu US Patent 11,588,796, 2023 | 41 | 2023 |
KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018 | 39 | 2018 |
Reranz: A light-weight virtual machine to mitigate memory disclosure attacks Z Wang, C Wu, J Li, Y Lai, X Zhang, WC Hsu, Y Cheng Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017 | 39 | 2017 |
Appshield: Protecting applications against untrusted operating system Y Cheng, X Ding, R Deng Singaport Management University Technical Report, SMU-SIS-13 101, 2013 | 38 | 2013 |
Adaptive call-site sensitive control flow integrity M Khandaker, A Naser, W Liu, Z Wang, Y Zhou, Y Cheng 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 95-110, 2019 | 37 | 2019 |
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ... Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 37 | 2017 |
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. Z Qi, Q Feng, Y Cheng, M Yan, P Li, H Yin, T Wei NDSS, 2021 | 33 | 2021 |
DriverGuard: A fine-grained protection on I/O flows Y Cheng, X Ding, RH Deng Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011 | 30 | 2011 |