Xiaolan Zhang
Xiaolan Zhang
Verified email at
Cited by
Cited by
Design and implementation of a TCG-based integrity measurement architecture.
R Sailer, X Zhang, T Jaeger, L Van Doorn
USENIX Security symposium 13 (2004), 223-238, 2004
Hypersentry: enabling stealthy in-context measurement of hypervisor integrity
AM Azab, P Ning, Z Wang, X Jiang, X Zhang, NC Skalsky
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Managing security of virtual machine images in a cloud environment
J Wei, X Zhang, G Ammons, V Bala, P Ning
Proceedings of the 2009 ACM workshop on Cloud computing security, 91-96, 2009
Methods and arrangements for unified program analysis
TR Jaeger, L Koved, L Zeng, X Zhang
US Patent 7,493,602, 2009
System support for automatic profiling and optimization
X Zhang, Z Wang, N Gloy, JB Chen, MD Smith
ACM SIGOPS Operating Systems Review 31 (5), 15-26, 1997
Attestation-based policy enforcement for remote access
R Sailer, T Jaeger, X Zhang, L Van Doorn
Proceedings of the 11th ACM conference on Computer and communications …, 2004
XenSocket: A high-throughput interdomain transport for virtual machines
X Zhang, S McIntosh, P Rohatgi, JL Griffin
Middleware 2007: ACM/IFIP/USENIX 8th International Middleware Conference …, 2007
Use of snapshots to reduce risk in migration to a standard virtualized environment
V Bala, K Bhattacharya, T Diethelm, P Jayachandran, L Renganarayana, ...
US Patent 9,092,837, 2015
Analyzing Integrity Protection in the {SELinux} Example Policy
T Jaeger, R Sailer, X Zhang
12th USENIX Security Symposium (USENIX Security 03), 2003
Using {CQUAL} for static analysis of authorization hook placement
X Zhang, A Edwards, T Jaeger
11th USENIX Security Symposium (USENIX Security 02), 2002
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
C Kil, EC Sezer, AM Azab, P Ning, X Zhang
2009 IEEE/IFIP International Conference on Dependable Systems & Networks …, 2009
Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms
AM Azab, P Ning, X Zhang
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Encore: Exploiting system environment and correlation information for misconfiguration detection
J Zhang, L Renganarayana, X Zhang, N Ge, V Bala, T Xu, Y Zhou
Proceedings of the 19th international conference on Architectural support …, 2014
HIMA: A hypervisor-based integrity measurement agent
AM Azab, P Ning, EC Sezer, X Zhang
2009 Annual Computer Security Applications Conference, 461-470, 2009
Parallel garbage collection for shared memory multiprocessors
CH Flood, D Detlefs, N Shavit, X Zhang
Java (TM) Virtual Machine Research and Technology Symposium (JVM 01), 2001
The case for application-specific benchmarking
M Seltzer, D Krinsky, K Smith, X Zhang
Proceedings of the Seventh Workshop on Hot Topics in Operating Systems, 102-107, 1999
Migration to managed clouds
K Bhattacharya, F Graf, MA Markley, BM Pfitzmann, M Schlatter, HC Thio, ...
US Patent 9,692,632, 2017
Secure coprocessor-based intrusion detection
X Zhang, L Van Doorn, T Jaeger, R Perez, R Sailer
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 239-242, 2002
AutoISES: Automatically Inferring Security Specification and Detecting Violations.
L Tan, X Zhang, X Ma, W Xiong, Y Zhou
USENIX Security Symposium, 379-394, 2008
Policy management using access control spaces
T Jaeger, X Zhang, A Edwards
ACM Transactions on Information and System Security (TISSEC) 6 (3), 327-364, 2003
The system can't perform the operation now. Try again later.
Articles 1–20