Security implications of memory deduplication in a virtualized environment J Xiao, Z Xu, H Huang, H Wang 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013 | 96 | 2013 |
A covert channel construction in a virtualized environment J Xiao, Z Xu, H Huang, H Wang Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 44 | 2012 |
Kernel data attack is a realistic security threat J Xiao, H Huang, H Wang Security and Privacy in Communication Networks: 11th EAI International …, 2015 | 32 | 2015 |
Contextualizing consensus protocols in blockchain: A short survey G Bashar, G Hill, S Singha, P Marella, GG Dagher, J Xiao 2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019 | 23 | 2019 |
KShot: Live kernel patching with SMM and SGX L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020 | 22 | 2020 |
HyperLink: Virtual machine introspection and memory forensic analysis without kernel source code J Xiao, L Lu, H Wang, X Zhu 2016 IEEE international conference on autonomic computing (ICAC), 127-136, 2016 | 20 | 2016 |
Nighthawk: Transparent system introspection from ring-3 L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 17 | 2019 |
A coprocessor-based introspection framework via intel management engine L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021 | 12 | 2021 |
Understanding the security implication of aborting virtual machine live migration X Gao, J Xiao, H Wang, A Stavrou IEEE Transactions on Cloud Computing 10 (2), 1275-1286, 2020 | 9 | 2020 |
Understanding the manipulation on recommender systems through web injection Y Zhang, J Xiao, S Hao, H Wang, S Zhu, S Jajodia IEEE Transactions on Information Forensics and Security 15, 3807-3818, 2019 | 9 | 2019 |
Cloudskulk: A nested virtual machine based rootkit and its detection J Connelly, T Roberts, X Gao, J Xiao, H Wang, A Stavrou 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 7 | 2021 |
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment D Le, J Xiao, H Huang, H Wang 10th International Conference on Network and Service Management (CNSM) and …, 2014 | 6 | 2014 |
Hyperprobe: Towards virtual machine extrospection J Xiao, L Lu, H Huang, H Wang 29th Large Installation System Administration Conference (LISA15), 1-12, 2015 | 5 | 2015 |
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability Z Chen, D Liu, J Xiao, H Wang Proceedings of the 26th International Symposium on Research in Attacks …, 2023 | 4 | 2023 |
COMS: customer oriented migration service K Huang, X Gao, F Zhang, J Xiao 2017 IEEE 10th international conference on cloud computing (CLOUD), 692-695, 2017 | 4 | 2017 |
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds J Xiao, L Lu, H Huang, H Wang IEEE Transactions on Cloud Computing 9 (1), 401-413, 2018 | 2 | 2018 |
A study of the multiple sign-in feature in web applications M Albahar, X Gao, G Dagher, D Liu, F Zhang, J Xiao Security and Privacy in Communication Networks: 15th EAI International …, 2019 | 1 | 2019 |
Exploiting CPU Clock Modulation for Covert Communication Channel S Alam, J Xiao, NU Eisty arXiv preprint arXiv:2404.05823, 2024 | | 2024 |
Hardware-assisted Live Kernel Function Updating on Intel Platforms L Zhou, F Zhang, K Leach, X Ding, Z Ning, G Wang, J Xiao IEEE Transactions on Dependable and Secure Computing, 2023 | | 2023 |
CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution S Alam, L Guan, Z Chen, H Wang, J Xiao 2023 IEEE 43rd International Conference on Distributed Computing Systems …, 2023 | | 2023 |