VTrust: Regaining Trust on Virtual Calls C Zhang, S Carr, T Li, Y Ding, C Song, M Payer, D Song The Network and Distributed System Security Symposium (NDSS'16) 2016, 2016 | 105 | 2016 |
Towards Memory Safe Enclave Programming with Rust-SGX H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ... the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2333 …, 2019 | 99 | 2019 |
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks Y Ding, T Wei, TL Wang, Z Liang, W Zou Proceedings of the 26th Annual Computer Security Applications Conference …, 2010 | 65 | 2010 |
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017 | 44 | 2017 |
Android Low Entropy Demystified Y Ding, Z Peng, Y Zhou, C Zhang IEEE International Conference on Communications (ICC), 2014 | 21 | 2014 |
A framework to eliminate backdoors from response-computable authentication S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou 2012 IEEE Symposium on Security and Privacy, 3-17, 2012 | 17 | 2012 |
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 12 | 2020 |
Accurate and Efficient Exploit Capture and Classification Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han SCIENCE CHINA Information Sciences 60 (5), 2017 | 12 | 2017 |
Towards memory safe python enclave for security sensitive computation H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding arXiv preprint arXiv:2005.05996, 2020 | 5 | 2020 |
Poster: AdHoneyDroid: Capture Malicious Android Advertisements D Wang, S Dai, Y Ding, T Li, X Han 21st ACM Conference on Computer and Communications Security (Poster), 2014 | 5 | 2014 |
Secure multiparty computing framework using a restricted operating environment with a guest agent Y Cheng, Y Zhang, Y Ding, T Wei US Patent 11,159,322, 2021 | 4 | 2021 |
基于敏感字符的SQL注入攻击防御方法 H Zhang, Y Ding, L Zhang, L Duan, C Zhang, T Wei, G Li, X Han Journal of Computer Research and Development 53 (10), 2262-2276, 2016 | 4* | 2016 |
SQL Injection Attack Defense Method Based on Sensitive Characters [J] Z Huilin, D Yu, Z Lihua Computer Research and Development 53 (10), 2262-2276, 2016 | 4 | 2016 |
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree T Li, T Li, Y Ding, Y Zhang, T Wei, X Han Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019 | 3 | 2019 |
PTStore: Lightweight Architectural Support for Page Table Isolation W Tan, Y Li, J Wu, C Zhang, Y Chen, Y Ding 2023 60th ACM/IEEE Design Automation Conference (DAC), 2023 | 1 | 2023 |
Generic verification approach for Protobuf based projects Q Feng, Y Zhang, P Wang, Y Ding, T Wei US Patent 10,732,944, 2020 | 1 | 2020 |
Poster: Classifying Downloaders Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han IEEE Symposium on Security and Privacy, 2015 | 1 | 2015 |
Broadly Enabling KLEE to Effortlessly Find Unrecoverable Errors in Rust Y Zhang, P Li, Y Ding, L Wang, D Williams, N Meng Proceedings of the 46th International Conference on Software Engineering, 2024 | | 2024 |
Token based secure multiparty computing framework using a restricted operating environment Y Cheng, Y Zhang, Y Ding, T Wei US Patent 11,128,617, 2021 | | 2021 |
Method, apparatus and system for device identification Y Ding, T Wei, Y Zhang US Patent 10,341,093, 2019 | | 2019 |