Lok-Kwong Yan

According to our database1, Lok-Kwong Yan authored at least 11 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Debloating Software through Piece-Wise Compilation and Loading.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
DECAF: A Platform-Neutral Whole-System Dynamic Binary Analysis Platform.
IEEE Trans. Software Eng., 2017

2015
A two-dimensional chaotic logic gate for improved computer security.
Proceedings of the IEEE 58th International Midwest Symposium on Circuits and Systems, 2015

2014
Nanoelectronics and Hardware Security.
Proceedings of the Network Science and Cybersecurity, 2014

Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform.
Proceedings of the International Symposium on Software Testing and Analysis, 2014

2013
Foundations of memristor based PUF architectures.
Proceedings of the IEEE/ACM International Symposium on Nanoscale Architectures, 2013

A write-time based memristive PUF for hardware security applications.
Proceedings of the IEEE/ACM International Conference on Computer-Aided Design, 2013

2012
V2E: combining hardware virtualization and softwareemulation for transparent and extensible malware analysis.
Proceedings of the 8th International Conference on Virtual Execution Environments, 2012

DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2008
Extending hardware based mandatory access controls for memory to multicore architectures.
Proceedings of the 4th annual workshop on Cyber security and information intelligence research, 2008


  Loading...