Lingguang Lei

Orcid: 0000-0002-1936-0562

According to our database1, Lingguang Lei authored at least 26 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

2023
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider.
Proceedings of the 52nd International Conference on Parallel Processing, 2023

2022
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform.
IEEE Trans. Inf. Forensics Secur., 2022

Booting IoT Terminal Device Securely with eMMC.
Proceedings of the IEEE International Conference on Trust, 2022

2021
Vulnerable Service Invocation and Countermeasures.
IEEE Trans. Dependable Secur. Comput., 2021

A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2020
SecureESFS: Sharing Android External Storage Files in A Securer Way.
Proceedings of the 19th IEEE International Conference on Trust, 2020

TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Evaluation on the Security of Commercial Cloud Container Services.
Proceedings of the Information Security - 23rd International Conference, 2020

Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Comput. Secur., 2019

ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

SuiT: Secure User Interface Based on TrustZone.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
How to Block the Malicious Access to Android External Storage.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Chord: Thwarting Relay Attacks Among Near Field Communications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

A Measurement Study on Linux Container Security: Attacks and Countermeasures.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
SPEAKER: Split-Phase Execution of Application Containers.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
How Your Phone Camera Can Be Used to Stealthily Spy on You: Transplantation Attacks against Android Camera Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Transplantation Attack: Analysis and Prediction.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012


  Loading...