Weidong Cui

According to our database1, Weidong Cui authored at least 37 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Classification and Analysis of Human Body Movement Characteristics Associated with Acrophobia Induced by Virtual Reality Scenes of Heights.
Sensors, 2023

Nimble: Rollback Protection for Confidential Cloud Services (extended version).
IACR Cryptol. ePrint Arch., 2023

E&V: Prompting Large Language Models to Perform Static Analysis by Pseudo-code Execution and Verification.
CoRR, 2023

Leveraging Large Language Models for Automated Proof Synthesis in Rust.
CoRR, 2023

Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Nimble: Rollback Protection for Confidential Cloud Services.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

2022
Gated Recurrent Unit Network for Psychological Stress Classification Using Electrocardiograms from Wearable Devices.
Sensors, 2022

Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

Research on Fault Diagnosis Technology of Model Support System based on Feature Extraction.
Proceedings of the 15th International Symposium on Computational Intelligence and Design, 2022

Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Security and Machine Learning in the Real World.
CoRR, 2020

Reverse Debugging of Kernel Failures in Deployed Systems.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

2018
REPT: Reverse Debugging of Failures in Deployed Software.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

Latte: Large-Scale Lateral Movement Detection.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

2017
High-Resolution Side Channels for Untrusted Operating Systems.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Lazy Diagnosis of In-Production Concurrency Bugs.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

GRIFFIN: Guarding Control Flows Using Intel Processor Trace.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
RETracer: triaging crashes by reverse execution from partial memory dumps.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2013
deDacota: toward preventing server-side XSS via automatic code and data separation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Tracking Rootkit Footprints with a Practical Memory Analysis System.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
GQ: practical containment for measuring modern malware systems.
Proceedings of the 11th ACM SIGCOMM Internet Measurement Conference, 2011

2009
ReFormat: Automatic Reverse Engineering of Encrypted Messages.
Proceedings of the Computer Security, 2009

Countering kernel rootkits with lightweight hook protection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Secure in-VM monitoring using hardware virtualization.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Mapping kernel objects to enable systematic integrity checking.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Spectator: Detection and Containment of JavaScript Worms.
Proceedings of the 2008 USENIX Annual Technical Conference, 2008

Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Tupni: automatic reverse engineering of input formats.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Discoverer: Automatic Protocol Reverse Engineering from Network Traces.
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007

ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

2006
Protocol-Independent Adaptive Replay of Application Dialog.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
BINDER: An Extrusion-Based Break-In Detector for Personal Computers.
Proceedings of the 2005 USENIX Annual Technical Conference, 2005

Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2002

Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks.
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP 2002), 2002


  Loading...