According to our database1, Yueqiang Cheng authored at least 42 papers between 2009 and 2021.
Legend:Book In proceedings Article PhD thesis Other
IEEE Trans. Inf. Forensics Secur., 2021
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh.
Proc. ACM Program. Lang., 2020
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines.
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015
Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
ACM Trans. Inf. Syst. Secur., 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Virtualization Based Password Protection against Malware in Untrusted Operating Systems.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Trusted Systems, First International Conference, 2009