Zhuojia Shen

Orcid: 0000-0002-8052-8643

According to our database1, Zhuojia Shen authored at least 12 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion.
CoRR, 2023

2022
Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage.
Proceedings of the 31st USENIX Security Symposium, 2022

Randezvous: Making Randomization Effective on MCUs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2020
Fast Execute-Only Memory for Embedded Systems.
CoRR, 2020

Silhouette: Efficient Protected Shadow Stacks for Embedded Systems.
Proceedings of the 29th USENIX Security Symposium, 2020

Fast Execute-Only Memory for Embedded Systems.
Proceedings of the IEEE Secure Development, SecDev 2020, Atlanta, GA, USA, 2020

2019
Silhouette: Efficient Intra-Address Space Isolation for Protected Shadow Stacks on Embedded Systems.
CoRR, 2019

Restricting Control Flow During Speculative Execution with Venkman.
CoRR, 2019

2018
Shielding Software From Privileged Side-Channel Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Spectres, virtual ghosts, and hardware support.
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018

Restricting Control Flow During Speculative Execution.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2015
Embedding of Hypercube into Cylinder.
CoRR, 2015


  Loading...