Yan Wen

Affiliations:
  • Beijing Linzhuo Infomation Technology, China
  • National Key Laboratory of Science and Technology on Information System Security, Beijing, China (former)
  • National University of Defense Technology, Changsha, China (former)


According to our database1, Yan Wen authored at least 30 papers between 2007 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A heuristic fuzz test generator for Java native interface.
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019

2014
Towards Thwarting Data Leakage with Memory Page Access Interception.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

FVisor: Towards Thwarting Unauthorized File Accesses with a Light-Weight Hypervisor.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Shielding Your Privacy with the Local-Booted Virtual Machine.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Evaluation on the influence of internet prefix hijacking events.
Comput. Sci. Inf. Syst., 2013

Emulation on the Internet Prefix Hijacking Attack Impaction.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Towards sharing disks between host OS and virtual machine with volume snapshot technology.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

Towards Implicitly Introspecting the Preinstalled Operating System with Local-Booting Virtualization Technology.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
The Relation on Prefix Hijacking and the Internet Hierarchy.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Reversing Engineering Data Structures in Binary Programs: Overview and Case Study.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Secure Service and Management for Security-Critical Wireless Sensor Network.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Analysis on the Effect of Prefix Hijacking Attack and Internet Hierarchy.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Towards Detecting Thread Deadlock in Java Programs with JVM Introspection.
Proceedings of the IEEE 10th International Conference on Trust, 2011

H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

Towards a Flaw Function Heuristic Vulnerability Static Analysis Framework for Executable File.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

An Overview of Bootkit Attacking Approaches.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Aquarius: A Tiny Hypervisor to Introspect Commodity OSes in a Non-bypassable Way.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
A software vulnerability analysis environment based on virtualization technology.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Implicit detection of stealth software with a local-booted virtual machine.
Proceedings of the 3rd International Conference on Information Sciences and Interaction Sciences (ICIS 2010), 2010

Towards Detecting the Interaction Vulnerabilities in Large Distributed System.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Research on Technologies of Building Experimental Environment for Network Worm Simulation.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Hiding "real" machine from attackers and malware with a minimal virtual machine monitor.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Novel Intrusion-Tolerant Approach for Internet Access.
Proceedings of the International Symposium on Information Processing, 2008

Reliability Design for Large Scale Storage Systems.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted Virtual Machine Monitor.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
A Secure Virtual Execution Environment for Untrusted Code.
Proceedings of the Information Security and Cryptology, 2007

A Novel Approach for Untrusted Code Execution.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

On the Power-Law of the Internet and the Hierarchy of BGP Convergence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007


  Loading...