Xiao, Jidong
490  Ergebnisse:
Personensuche X
?
1

Hardware-Assisted Live Kernel Function Updating on Intel Pl..:

Zhou, Lei ; Zhang, Fengwei ; Leach, Kevin...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 2085-2098 , 2024
 
?
2

CAUSEC: Cache-Based Secure Key Computation with (Mostly) De..:

, In: 2023 IEEE 43rd International Conference on Distributed Computing Systems (ICDCS),
Alam, Shariful ; Guan, Le ; Chen, Zeyu.. - p. 84-95 , 2023
 
?
3

All Use-After-Free Vulnerabilities Are Not Created Equal: A..:

, In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses,
Chen, Zeyu ; Liu, Daiping ; Xiao, Jidong. - p. 623-638 , 2023
 
?
6

Understanding the Security Implication of Aborting Virtual ..:

Gao, Xing ; Xiao, Jidong ; Wang, Haining.
IEEE Transactions on Cloud Computing.  10 (2022)  2 - p. 1275-1286 , 2022
 
?
7

Virtual Machine Extrospection: A Reverse Information Retrie..:

Xiao, Jidong ; Lu, Lei ; Huang, Hai.
IEEE Transactions on Cloud Computing.  9 (2021)  1 - p. 401-413 , 2021
 
?
8

Effect of perioperative blood pressure variability on cereb..:

He, Guo-yong ; Li, Yan-hua ; Wei, Jun-jie...
Interventional Neuroradiology.  28 (2021)  6 - p. 702-707 , 2021
 
?
 
?
10

KShot: Live Kernel Patching with SMM and SGX:

, In: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Zhou, Lei ; Zhang, Fengwei ; Liao, Jinghui... - p. 1-13 , 2020
 
?
11

Contextualizing Consensus Protocols in Blockchain: A Short ..:

, In: 2019 First IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA),
Bashar, Golam ; Hill, Graham ; Singha, Subroto... - p. 190-195 , 2019
 
?
12

A Study of the Multiple Sign-in Feature in Web Applications:

, In: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Security and Privacy in Communication Networks,
Albahar, Marwan ; Gao, Xing ; Dagher, Gaby... - p. 440-453 , 2019
 
?
13

Nighthawk: Transparent System Introspection from Ring -3:

, In: Lecture Notes in Computer Science; Computer Security – ESORICS 2019,
Zhou, Lei ; Xiao, Jidong ; Leach, Kevin... - p. 217-238 , 2019
 
1-15