Jinpeng Wei

According to our database1, Jinpeng Wei authored at least 41 papers between 2005 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Binary-centric defense of production operating systems against kernel queue injection attacks.
J. Computer Virology and Hacking Techniques, 2019

Tail Amplification in n-Tier Systems: A Study of Transient Cross-Resource Contention Attacks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Autonomous Cyber Deception - Reasoning, Adaptive Planning, and Evaluation of HoneyThings
Springer, ISBN: 978-3-030-02110-8, 2019

City Disaster Susceptibility Comparisons using Weighted Bipartite Graphs.
IJNGC, 2018

A Reflective Covert Channel Attack Anchored on Trusted Web Services.
Proceedings of the Web Services - ICWS 2018, 2018

A Poisoning Attack Against Cryptocurrency Mining Pools.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

A Natural Language Processing Based Trend Analysis of Advanced Persistent Threat Techniques.
Proceedings of the IEEE International Conference on Big Data, 2018

gExtractor: Towards Automated Extraction of Malware Deception Parameters.
Proceedings of the 8th Software Security, 2018

The Design of Cyber Threat Hunting Games: A Case Study.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications.
IJNDC, 2016

Toward integrity assurance of outsourced computing - a game theoretic perspective.
Future Gener. Comput. Syst., 2016

An adaptive middleware design to support the dynamic interpretation of domain-specific models.
Inf. Softw. Technol., 2015

Toward protecting control flow confidentiality in cloud-based computation.
Comput. Secur., 2015

MOSE: Live Migration Based On-the-Fly Software Emulation.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Static analysis based invariant detection for commodity operating systems.
Comput. Secur., 2014

A bipartite-graph based approach for disaster susceptibility comparisons among cities.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Bring your own device security issues and challenges.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

Value-Added Modelling and Analysis in Service Value Brokerage.
Proceedings of the Service-Oriented Computing - ICSOC 2013 Workshops, 2013

KQguard: Binary-Centric Defense against Kernel Queue Injection Attacks.
Proceedings of the Computer Security - ESORICS 2013, 2013

IntegrityMR: Integrity assurance framework for big data analytics and management applications.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Constructing E-Tourism platform based on service value broker: A knowledge management perspective.
Proceedings of the 2013 IEEE International Conference on Big Data, 2013

Result Integrity Check for MapReduce Computation on Hybrid Clouds.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

Toward a general defense against kernel queue hooking attacks.
Comput. Secur., 2012

Software Persistent Memory.
Proceedings of the 2012 USENIX Annual Technical Conference, 2012

Towards Adaptable Middleware to Support Service Delivery Validation in i-DSML Execution Engines.
Proceedings of the 14th International IEEE Symposium on High-Assurance Systems Engineering, 2012

Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

Static analysis based invariant detection for commodity operating systems.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

VIAF: Verification-Based Integrity Assurance Framework for MapReduce.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

Modeling and preventing TOCTTOU vulnerabilities in Unix-style file systems.
Comput. Secur., 2010

Fixed-Parameter Tractable Combinatorial Algorithms for Metabolic Networks Alignments.
Proceedings of the ICDMW 2010, 2010

Modeling the Runtime Integrity of Cloud Servers: A Scoped Invariant Perspective.
Proceedings of the Cloud Computing, Second International Conference, 2010

WS-GraphMatching: a web service tool for graph matching.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Improving operating systems security: two case studies.
PhD thesis, 2009

Managing security of virtual machine images in a cloud environment.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

A Secure Information Flow Architecture for Web Service Platforms.
IEEE Trans. Services Computing, 2008

Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

A Secure Information Flow Architecture for Web Services.
Proceedings of the 2008 IEEE International Conference on Services Computing (SCC 2008), 2008

Guarding Sensitive Information Streams through the Jungle of Composite Web Services.
Proceedings of the 2007 IEEE International Conference on Web Services (ICWS 2007), 2007

Towards Scalable and High Performance I/O Virtualization - A Case Study.
Proceedings of the High Performance Computing and Communications, 2007

Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

TOCTTOU Vulnerabilities in UNIX-Style File Systems: An Anatomical Study.
Proceedings of the FAST '05 Conference on File and Storage Technologies, 2005