Zhe Wang
Orcid: 0000-0003-4719-1804Affiliations:
- University of Chinese Academy of Sciences, Institute of Computing Technology, Huairou, Beijing, China
According to our database1,
Zhe Wang
authored at least 26 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Shining Light on the Inter-procedural Code Obfuscation: Keep Pace with Progress in Binary Diffing.
ACM Trans. Archit. Code Optim., March, 2025
CoRR, January, 2025
XHarvest: Rethinking High-Performance and Cost-Efficient SSD Architecture with CXL-Driven Harvesting.
Proceedings of the 52nd Annual International Symposium on Computer Architecture, 2025
Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications.
Proceedings of the 18th USENIX Symposium on Operating Systems Design and Implementation, 2024
CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques.
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on Languages, 2024
Enhancing Learning-Based Binary Code Similarity Detection Model through Adversarial Training with Multiple Function Variants.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
2023
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023
IEEE Trans. Dependable Secur. Comput., 2023
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 21st ACM/IEEE International Symposium on Code Generation and Optimization, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.
Proceedings of the 2022 USENIX Annual Technical Conference, 2022
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019
2018
2017
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
2015
HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines.
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2015
2011
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011