A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography X Lou, T Zhang, J Jiang, Y Zhang ACM Computing Surveys (CSUR) 54 (6), 1-37, 2021 | 40 | 2021 |
HyperCrop: a hypervisor-based countermeasure for return oriented programming J Jiang, X Jia, D Feng, S Zhang, P Liu International Conference of Information and Communications Security, 360-373, 2011 | 16 | 2011 |
Defending return-oriented programming based on virtualization techniques X Jia, R Wang, J Jiang, S Zhang, P Liu Security and Communication Networks 6 (10), 1236-1249, 2013 | 11 | 2013 |
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ... Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017 | 10 | 2017 |
Vccbox: Practical confinement of untrusted software in virtual cloud computing J Jiang, M Nie, P Su, D Feng Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 2 | 2013 |