Zhi Wang

Affiliations:
  • Florida State University, Tallahassee, FL, USA
  • North Carolina State University, NC, USA (former)


According to our database1, Zhi Wang authored at least 54 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Systematic Study of Android Non-SDK (Hidden) Service API Security.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum.
ACM Trans. Softw. Eng. Methodol., 2022

SeqNet: An Efficient Neural Network for Automatic Malware Detection.
CoRR, 2022

RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices.
Proceedings of the 31st USENIX Security Symposium, 2022

SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
CATTmew: Defeating Software-Only Physical Kernel Isolation.
IEEE Trans. Dependable Secur. Comput., 2021

EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

An ear canal deformation based continuous user authentication using earables.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

Efficient Algorithms for Encrypted All-gather Operation.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

Encrypted All-reduce on Multi-core Clusters.
Proceedings of the IEEE International Performance, 2021

ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Liquid Level Sensing Using Commodity WiFi in a Smart Home Environment.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX.
CoRR, 2020

CryptMPI: A Fast Encrypted MPI Library.
CoRR, 2020

Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications.
CoRR, 2020

EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum.
CoRR, 2020

Automatic Hot Patch Generation for Android Kernels.
Proceedings of the 29th USENIX Security Symposium, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020

High-density Multi-tenant Bare-metal Cloud.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX.
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020

VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems.
IEEE Trans. Dependable Secur. Comput., 2019

TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

Origin-sensitive Control Flow Integrity.
Proceedings of the 28th USENIX Security Symposium, 2019

Adaptive Call-Site Sensitive Control Flow Integrity.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

An Empirical Study of Cryptographic Libraries for MPI Communications.
Proceedings of the 2019 IEEE International Conference on Cluster Computing, 2019

Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Adaptive Android Kernel Live Patching.
Proceedings of the 26th USENIX Security Symposium, 2017

Secure In-Cache Execution.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

Pinpointing Vulnerabilities.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Remix: On-demand Live Randomization.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Harvesting developer credentials in Android apps.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

SecPod: a Framework for Virtualization-based Security Systems.
Proceedings of the 2015 USENIX Annual Technical Conference, 2015

Xede: Practical Exploit Early Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Hybrid User-level Sandboxing of Third-party Android Apps.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
DIVILAR: diversifying intermediate language for anti-repackaging on android platform.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Systematic audit of third-party android phones.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

ARMlock: Hardware-based Fault Isolation for ARM.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Systematic Detection of Capability Leaks in Stock Android Smartphones.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Isolating commodity hosted hypervisors with HyperLock.
Proceedings of the European Conference on Computer Systems, 2012

2011
Comprehensive and Efficient Protection of Kernel Control Data.
IEEE Trans. Inf. Forensics Secur., 2011

Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
DKSM: Subverting Virtual Machine Introspection for Fun and Profit.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Transparent Protection of Commodity OS Kernels Using Hardware Virtualization.
Proceedings of the Security and Privacy in Communication Networks, 2010

Defeating return-oriented rootkits with "<i>Return-Less</i>" kernels.
Proceedings of the European Conference on Computer Systems, 2010

HyperSentry: enabling stealthy in-context measurement of hypervisor integrity.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
ReFormat: Automatic Reverse Engineering of Encrypted Messages.
Proceedings of the Computer Security, 2009

Countering kernel rootkits with lightweight hook protection.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Countering Persistent Kernel Rootkits through Systematic Hook Discovery.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008


  Loading...