Le Guan

According to our database1, Le Guan authored at least 15 papers between 2013 and 2018.

Collaborative distances :

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
VaultIME: Regaining User Control for Password Managers through Auto-correction.
ICST Trans. Security Safety, 2018

2017
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
CoRR, 2017

Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices.
CoRR, 2017

VCIDS: Collaborative Intrusion Detection of Sensor and Actuator Attacks on Connected Vehicles.
Proceedings of the Security and Privacy in Communication Networks, 2017

VaultIME: Regaining User Control for Password Managers Through Auto-Correction.
Proceedings of the Security and Privacy in Communication Networks, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Secure Computing Using Registers and Caches: The Problem, Challenges, and Solutions.
IEEE Security & Privacy, 2016

Exploiting Insurance Telematics for Fun and Profit.
CoRR, 2016

From Physical to Cyber: Escalating Protection for Personalized Auto Insurance.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

2015
Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
virtio-ct: A Secure Cryptographic Token Service in Hypervisors.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Copker: Computing with Private Keys without RAM.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Implementing a Covert Timing Channel Based on Mimic Function.
Proceedings of the Information Security Practice and Experience, 2014

2013
Fingerprint Embedding: A Proactive Strategy of Detecting Timing Channels.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...