Yuan Xiao

Orcid: 0009-0003-7249-277X

Affiliations:
  • Intel Labs, USA
  • Ohio State University, Columbus, OH, USA (former)


According to our database1, Yuan Xiao authored at least 9 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments.
Proceedings of the 50th Annual International Symposium on Computer Architecture, 2023

2022
ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

2020
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution.
IEEE Secur. Priv., 2020

SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

2019
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution.
CoRR, 2018

2017
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation.
Proceedings of the 25th USENIX Security Symposium, 2016

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...