Xuhua Ding

Orcid: 0000-0003-3974-590X

Affiliations:
  • Singapore Management University, School of Information Systems


According to our database1, Xuhua Ding authored at least 82 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
T-Counter: Trustworthy and Efficient CPU Resource Measurement Using SGX in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices.
Proceedings of the Computer Security - ESORICS 2023, 2023

How to Resuscitate a Sick VM in the Cloud.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Smile: Secure Memory Introspection for Live Enclave.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

FastKLEE: faster symbolic execution via reducing redundant bound checking of type-safe pointers.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
A Coprocessor-Based Introspection Framework Via Intel Management Engine.
IEEE Trans. Dependable Secur. Comput., 2021

A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

On the Root of Trust Identification Problem.
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021

Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2019
Balancing Security and Privacy in Genomic Range Queries.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

2018
FIMCE: A Fully Isolated Micro-Computing Environment for Multicore Systems.
ACM Trans. Priv. Secur., 2018

Initializing trust in smart devices via presence attestation.
Comput. Commun., 2018

To Detect Stack Buffer Overflow with Polymorphic Canaries.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

2017
Adaptable key-policy attribute-based encryption with time interval.
Soft Comput., 2017

Secure server-aided top-k monitoring.
Inf. Sci., 2017

Genomic Security (Lest We Forget).
IEEE Secur. Priv., 2017

Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed.
Proceedings of the 26th USENIX Security Symposium, 2017

On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
H-Binder: A Hardened Binder Framework on Android Systems.
Proceedings of the Security and Privacy in Communication Networks, 2016

Attribute-Based Encryption with Granular Revocation.
Proceedings of the Security and Privacy in Communication Networks, 2016

2015
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015

Hardware-Assisted Fine-Grained Code-Reuse Attack Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

On Security of Content-Based Video Stream Authentication.
Proceedings of the Computer Security - ESORICS 2015, 2015

Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data.
ACM Trans. Database Syst., 2014

A Hybrid Scheme for Authenticating Scalable Video Codestreams.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient authentication and access control of scalable multimedia streams over packet-lossy networks.
Secur. Commun. Networks, 2014

Efficient block-based transparent encryption for H.264/SVC bitstreams.
Multim. Syst., 2014

Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks.
J. Comput. Syst. Sci., 2014

ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Generic attacks on content-based video stream authentication.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2014

2013
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows.
ACM Trans. Inf. Syst. Secur., 2013

Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication.
IACR Cryptol. ePrint Arch., 2013

Guardian: Hypervisor as Security Foothold for Personal Computers.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Accountable Trapdoor Sanitizable Signatures.
Proceedings of the Information Security Practice and Experience, 2013

Technique for authenticating H.264/SVC streams in surveillance applications.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

Verifiable and private top-k monitoring.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams.
Signal Process. Image Commun., 2012

Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory.
Int. J. Comput. Intell. Syst., 2012

Virtualization Based Password Protection against Malware in Untrusted Operating Systems.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012

STC 2012: the seventh ACM workshop on scalable trusted computing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Coercion resistance in authentication responsibility shifting.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

A Generic Construction of Accountable Decryption and Its Applications.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Database Access Pattern Protection Without Full-Shuffles.
IEEE Trans. Inf. Forensics Secur., 2011

Lightweight Delegated Subset Test with Privacy Protection.
Proceedings of the Information Security Practice and Experience, 2011

DriverGuard: A Fine-Grained Protection on I/O Flows.
Proceedings of the Computer Security - ESORICS 2011, 2011

Hierarchical Identity-Based Chameleon Hash and Its Applications.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Efficient processing of exact top-<i>k</i> queries over disk-resident sorted lists.
VLDB J., 2010

Embellishing Text Search Queries To Protect User Privacy.
Proc. VLDB Endow., 2010

A new hardware-assisted PIR with O(<i>n</i>) shuffle cost.
Int. J. Inf. Sec., 2010

On Trustworthiness of CPU Usage Metering and Accounting.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Tuning On-Air Signatures for Balancing Performance and Confidentiality.
IEEE Trans. Knowl. Data Eng., 2009

Leak-free mediated group signatures.
J. Comput. Secur., 2009

Multiuser private queries over encrypted databases.
Int. J. Appl. Cryptogr., 2009

Remote Attestation on Function Execution (Work-in-Progress).
Proceedings of the Trusted Systems, First International Conference, 2009

Privacy-Preserving Querying in Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
An Efficient PIR Construction Using Trusted Hardware.
Proceedings of the Information Security, 11th International Conference, 2008

Private Query on Encrypted Data in Multi-user Settings.
Proceedings of the Information Security Practice and Experience, 2008

Model-Driven Remote Attestation: Attesting Remote System from Behavioral Aspect.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks.
Proceedings of IEEE International Conference on Communications, 2008

Remote attestation on program execution.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Equipping smart devices with public key signatures.
ACM Trans. Internet Techn., 2007

Protecting RFID communications in supply chains.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Private Information Retrieval Using Trusted Hardware.
IACR Cryptol. ePrint Arch., 2006

Secure Real-time User Preference Collection for Broadcast Scheduling.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Anomaly Based Web Phishing Page Detection.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

2004
Fine-grained control of security capabilities.
ACM Trans. Internet Techn., 2004

Leak-Free Group Signatures with Immediate Revocation.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

2003
Simple Identity-Based Cryptography with Mediated RSA.
Proceedings of the Topics in Cryptology, 2003

2002
Experimenting with Server-Aided Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Proceedings of the 10th USENIX Security Symposium, 2001


  Loading...