Yueqiang Cheng
Yueqiang Cheng
Zhejiang University; Singapore Management University; Carnegie Mellon University
Verified email at - Homepage
Cited by
Cited by
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy.
Y Zhu, Y Cheng, H Zhou, Y Lu
USENIX Security Symposium, 1973-1988, 2021
PCKV: Locally differentially private correlated key-value data collection with optimized utility
X Gu, M Li, Y Cheng, L Xiong, Y Cao
Proceedings of the 29th USENIX Conference on Security Symposium, 967-984, 2020
Efficient virtualization-based application protection against untrusted operating system
Y Cheng, X Ding, RH Deng
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
SpecuSym: Speculative symbolic execution for cache timing leak detection
S Guo, Y Chen, P Li, Y Cheng, H Wang, M Wu, Z Zuo
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
POSTER: Rust SGX SDK: Towards memory safety in Intel SGX enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Appshield: Protecting applications against untrusted operating system
Y Cheng, X Ding, R Deng
Singaport Management University Technical Report, SMU-SIS-13 101, 2013
Pthammer: Cross-user-kernel-boundary rowhammer through implicit accesses
Z Zhang, Y Cheng, D Liu, S Nepal, Z Wang, Y Yarom
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
COIN attacks: On insecurity of enclave untrusted interfaces in SGX
MR Khandaker, Y Cheng, Z Wang, T Wei
Proceedings of the Twenty-Fifth International Conference on Architectural …, 2020
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency
C Xiong, T Zhu, W Dong, L Ruan, R Yang, Y Cheng, Y Chen, S Cheng, ...
IEEE Transactions on Dependable and Secure Computing 19 (1), 551-565, 2020
Reranz: A light-weight virtual machine to mitigate memory disclosure attacks
Z Wang, C Wu, J Li, Y Lai, X Zhang, WC Hsu, Y Cheng
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on …, 2017
Data transmission with obfuscation for a data processing (DP) accelerator
Y Cheng, H Zhu
US Patent 11,588,796, 2023
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
YC Ruowen Wang, Ahmed M Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen ...
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
Continuous release of data streams under both centralized and local differential privacy
T Wang, JQ Chen, Z Zhang, D Su, Y Cheng, Z Li, N Li, S Jha
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
KASR: A reliable and practical approach to attack surface reduction of commodity OS kernels
Z Zhang, Y Cheng, S Nepal, D Liu, Q Shen, F Rabhi
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
Establishing software-only root of trust on embedded systems: facts and fiction
Y Li, Y Cheng, V Gligor, A Perrig
Security Protocols XXIII: 23rd International Workshop, Cambridge, UK, March …, 2015
DriverGuard: A fine-grained protection on I/O flows
Y Cheng, X Ding, RH Deng
Computer Security–ESORICS 2011: 16th European Symposium on Research in …, 2011
Adaptive call-site sensitive control flow integrity
M Khandaker, A Naser, W Liu, Z Wang, Y Zhou, Y Cheng
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 95-110, 2019
Dramdig: A knowledge-assisted tool to uncover dram address mapping
M Wang, Z Zhang, Y Cheng, S Nepal
2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.
M Li, Y Zhang, H Wang, K Li, Y Cheng
USENIX Security Symposium, 717-732, 2021
The system can't perform the operation now. Try again later.
Articles 1–20