Shijun Zhao

According to our database1, Shijun Zhao authored at least 30 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
rOOM: A Rust-Based Linux Out of Memory Kernel Component.
IEICE Trans. Inf. Syst., 2024

NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs.
CoRR, 2024

2023
Sluggish and Chemically-Biased Interstitial Diffusion in Concentrated Solid Solution Alloys: Mechanisms and Methods.
CoRR, 2023

Using Complex Network Communities to Evaluate the Correctness of Object Detection.
Proceedings of the 10th International Conference on Dependable Systems and Their Applications, 2023

2022
Study of the Algorithm for Wind Shear Detection with Lidar Based on Shear Intensity Factor.
Algorithms, 2022

Design and Implementation of OOM Module based on Rust.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2020
Rainfall Monitoring Based on Machine Learning by Earth-Space Link in the Ku Band.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

RIPTE: Runtime Integrity Protection Based on Trusted Execution for IoT Device.
Secur. Commun. Networks, 2020

A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0.
Comput. Networks, 2020

Formal Verification of Memory Isolation for the TrustZone-based TEE.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
SoftME: A Software-Based Memory Protection Approach for TEE System to Resist Physical Attacks.
Secur. Commun. Networks, 2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0.
CoRR, 2019

MicroTEE: Designing TEE OS Based on the Microkernel Architecture.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Minimal Kernel: An Operating System Architecture for TEE to Resist Board Level Physical Attacks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Log-Based Control Flow Attestation for Embedded Devices.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

SecTEE: A Software-based Approach to Secure Enclave Architecture Using TEE.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
AAoT: Lightweight attestation and authentication of low-resource things in IoT and CPS.
Comput. Networks, 2018

2017
Secure Code Updates for Smart Embedded Devices based on PUFs.
IACR Cryptol. ePrint Arch., 2017

Detection and Attention: Diagnosing Pulmonary Lung Cancer from CT by Imitating Physicians.
CoRR, 2017

2015
Security analysis of SM2 key exchange protocol in TPM2.0.
Secur. Commun. Networks, 2015

sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices.
IACR Cryptol. ePrint Arch., 2015

TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZone.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

2014
Universally Composable secure TNC protocol based on IF-T binding to TLS.
IACR Cryptol. ePrint Arch., 2014

Providing Root of Trust for ARM TrustZone using SRAM PUFs.
IACR Cryptol. ePrint Arch., 2014

Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Mdaak: A Flexible and Efficient Framework for Direct Anonymous Attestation on Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

2011
Enhancing Flexibility of TCG's TNC through Layered Property Attestation.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Property-Based Attestation Scheme with the Variable Privacy.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...