Jidong Xiao

Orcid: 0000-0001-6807-9999

According to our database1, Jidong Xiao authored at least 19 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

2022
Understanding the Security Implication of Aborting Virtual Machine Live Migration.
IEEE Trans. Cloud Comput., 2022

2021
A Coprocessor-Based Introspection Framework Via Intel Management Engine.
IEEE Trans. Dependable Secur. Comput., 2021

Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds.
IEEE Trans. Cloud Comput., 2021

CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Understanding the Manipulation on Recommender Systems through Web Injection.
IEEE Trans. Inf. Forensics Secur., 2020

KShot: Live Kernel Patching with SMM and SGX.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

2019
Contextualizing Consensus Protocols in Blockchain: A Short Survey.
Proceedings of the First IEEE International Conference on Trust, 2019

A Study of the Multiple Sign-in Feature in Web Applications.
Proceedings of the Security and Privacy in Communication Networks, 2019

Nighthawk: Transparent System Introspection from Ring -3.
Proceedings of the Computer Security - ESORICS 2019, 2019

2017
COMS: Customer Oriented Migration Service.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Hyperprobe: Towards Virtual Machine Extrospection.
Proceedings of the 2016 USENIX Annual Technical Conference, 2016

HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code.
Proceedings of the 2016 IEEE International Conference on Autonomic Computing, 2016

2015
Kernel Data Attack Is a Realistic Security Threat.
Proceedings of the Security and Privacy in Communication Networks, 2015

Defeating Kernel Driver Purifier.
Proceedings of the Security and Privacy in Communication Networks, 2015

2014
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment.
Proceedings of the 10th International Conference on Network and Service Management, 2014

2013
Security implications of memory deduplication in a virtualized environment.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

2012
A covert channel construction in a virtualized environment.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...