Wenhao Wang

Orcid: 0000-0001-7294-2724

Affiliations:
  • Chinese Academy of Sciences, SKLOIS, Institute of Information Engineering, Beijing, China


According to our database1, Wenhao Wang authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SegScope: Probing Fine-grained Interrupts via Architectural Footprints.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

2023
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput., 2023

Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
IEEE Trans. Dependable Secur. Comput., 2023

DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022

Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework.
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022

2021
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2021

Understanding TEE Containers, Easy to Use? Hard to Trust.
CoRR, 2021

Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Practical and Efficient in-Enclave Verification of Privacy Compliance.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR, 2020

Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR, 2019

Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR, 2019

2018
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
IACR Cryptol. ePrint Arch., 2018

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.
Proceedings of the Advances in Information and Computer Security, 2018

Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Binary Code Retrofitting and Hardening Using SGX.
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2015
Notes on Rainbow Distinguished Point Method.
CoRR, 2015

Searching cubes for testing Boolean functions and its application to Trivium.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2013
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation".
Cryptogr. Commun., 2013

Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications.
Proceedings of the Information and Communications Security - 13th International Conference, 2011


  Loading...