Yueqiang Cheng

According to our database1, Yueqiang Cheng authored at least 42 papers between 2009 and 2021.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh.
CoRR, 2021

AlphaFuzz: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search.
CoRR, 2021

Exposing cache timing side-channel leaks through out-of-order symbolic execution.
Proc. ACM Program. Lang., 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
CoRR, 2020

Hermes Attack: Steal DNN Models with Lossless Inference Accuracy.
CoRR, 2020

Continuous Release of Data Streams under both Centralized and Local Differential Privacy.
CoRR, 2020

GhostKnight: Breaching Data Integrity via Speculative Execution.
CoRR, 2020

PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.
Proceedings of the 29th USENIX Security Symposium, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

SpecuSym: speculative symbolic execution for cache timing leak detection.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

Super Root: A New Stealthy Rooting Technique on ARM Devices.
Proceedings of the Applied Cryptography and Network Security, 2020

TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines.
CoRR, 2019

SvTPM: A Secure and Efficient vTPM in the Cloud.
CoRR, 2019

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

Defending against ROP Attacks with Nearly Zero Overhead.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Adaptive Call-Site Sensitive Control Flow Integrity.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Interface-Based Side Channel Attack Against Intel SGX.
CoRR, 2018

A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017

ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

PiBooster: Performance Accelerations in Page Table Management for Paravirtual VMs.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services.
Proceedings of the Security and Privacy in Communication Networks, 2015

Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Proceedings of the 10th ACM Symposium on Information, 2015

ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows.
ACM Trans. Inf. Syst. Secur., 2013

Guardian: Hypervisor as Security Foothold for Personal Computers.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Virtualization Based Password Protection against Malware in Untrusted Operating Systems.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

DriverGuard: A Fine-Grained Protection on I/O Flows.
Proceedings of the Computer Security - ESORICS 2011, 2011

Remote Attestation on Function Execution (Work-in-Progress).
Proceedings of the Trusted Systems, First International Conference, 2009