Le Guan

According to our database1, Le Guan authored at least 14 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Copker: A Cryptographic Engine Against Cold-Boot Attacks.
IEEE Trans. Dependable Sec. Comput., 2018

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Enforcing Access Controls for the Cryptographic Cloud Service Invocation Based on Virtual Machine Introspection.
Proceedings of the Information Security - 21st International Conference, 2018

VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles.
Proceedings of the Security and Privacy in Communication Networks, 2017

VaultIME: Regaining User Control for Password Managers Through Auto-Correction.
Proceedings of the Security and Privacy in Communication Networks, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Security & Privacy, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

virtio-ct: A Secure Cryptographic Token Service in Hypervisors.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Copker: Computing with Private Keys without RAM.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Implementing a Covert Timing Channel Based on Mimic Function.
Proceedings of the Information Security Practice and Experience, 2014

Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Proceedings of the Information and Communications Security - 15th International Conference, 2013