Xinyang Ge

Orcid: 0000-0001-6030-2068

According to our database1, Xinyang Ge authored at least 23 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Measurement of Embedding Choices on Cryptographic API Completion Tasks.
ACM Trans. Softw. Eng. Methodol., March, 2024

2023
Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

A 0D-3D multi-scale model of the portal venous system coupled with the entire cardiovascular system applied to predict postsplenectomy hemodynamic metrics.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

2022
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Embedding Code Contexts for Cryptographic API Suggestion: New Methodologies and Comparisons.
CoRR, 2021

HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Reverse Debugging of Kernel Failures in Deployed Systems.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019

2018
REPT: Reverse Debugging of Failures in Deployed Software.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

2017
Lazy Diagnosis of In-Production Concurrency Bugs.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

An Evil Copy: How the Loader Betrays You.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

GRIFFIN: Guarding Control Flows Using Intel Processor Trace.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Fine-Grained Control-Flow Integrity for Kernel Software.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Pileus: protecting user resources from vulnerable cloud services.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

2014
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture.
CoRR, 2014

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Policy models to protect resource retrieval.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

2012
An SVD-based Collaborative Filtering approach to alleviate cold-start problems.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

2011
A new prediction approach based on linear regression for collaborative filtering.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011


  Loading...