default search action
Yueqiang Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Qidong Huang, Xiaoyi Dong, Dongdong Chen, Hang Zhou, Weiming Zhang, Kui Zhang, Gang Hua, Yueqiang Cheng, Nenghai Yu:
PointCAT: Contrastive Adversarial Training for Robust Point Cloud Recognition. IEEE Trans. Image Process. 33: 2183-2196 (2024) - [j15]Xiaohan Zhang, Jinwen Wang, Yueqiang Cheng, Qi Li, Kun Sun, Yao Zheng, Ning Zhang, Xinghua Li:
Interface-Based Side Channel in TEE-Assisted Networked Services. IEEE/ACM Trans. Netw. 32(1): 613-626 (2024) - [c39]Zhi Zhang, Decheng Chen, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou, Jiliang Zhang, Yang Xiang:
SoK: Rowhammer on Commodity Operating Systems. AsiaCCS 2024 - 2023
- [j14]Liang Liu, Yanan Guo, Yueqiang Cheng, Youtao Zhang, Jun Yang:
Generating Robust DNN With Resistance to Bit-Flip Based Adversarial Weight Attack. IEEE Trans. Computers 72(2): 401-413 (2023) - [j13]Juan Wang, Jie Wang, Chengyang Fan, Fei Yan, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Mengda Yang, Hongxin Hu:
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2936-2953 (2023) - [j12]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 827-840 (2023) - [j11]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023) - [c38]Yanan Guo, Takami Sato, Yulong Cao, Qi Alfred Chen, Yueqiang Cheng:
Adversarial Attacks on Adaptive Cruise Control Systems. CPS-IoT Week Workshops 2023: 49-54 - [c37]Xiaoke Wang, Tao Hui, Lei Zhao, Yueqiang Cheng:
Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation. ESEC/SIGSOFT FSE 2023: 934-946 - 2022
- [j10]Yueqiang Cheng, Zhi Zhang, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei, Surya Nepal, Yang Xiang:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. Comput. Secur. 113: 102556 (2022) - [j9]Chunlin Xiong, Tiantian Zhu, Weihao Dong, Linqi Ruan, Runqing Yang, Yueqiang Cheng, Yan Chen, Shuai Cheng, Xutong Chen:
Conan: A Practical Real-Time APT Detection System With High Accuracy and Efficiency. IEEE Trans. Dependable Secur. Comput. 19(1): 551-565 (2022) - [j8]Runqing Yang, Xutong Chen, Haitao Xu, Yueqiang Cheng, Chunlin Xiong, Linqi Ruan, Mohammad Kavousi, Zhenyuan Li, Liheng Xu, Yan Chen:
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows. IEEE Trans. Dependable Secur. Comput. 19(3): 1621-1638 (2022) - [j7]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
Making Information Hiding Effective Again. IEEE Trans. Dependable Secur. Comput. 19(4): 2576-2594 (2022) - [c36]Yiru Zhao, Xiaoke Wang, Lei Zhao, Yueqiang Cheng, Heng Yin:
Alphuzz: Monte Carlo Search on Seed-Mutation Tree for Coverage-Guided Fuzzing. ACSAC 2022: 534-547 - [c35]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. USENIX ATC 2022: 399-414 - [i18]Zhi Zhang, Jiahao Qi, Yueqiang Cheng, Shijie Jiang, Yiyang Lin, Yansong Gao, Surya Nepal, Yi Zou:
A Retrospective and Futurespective of Rowhammer Attacks and Defenses on DRAM. CoRR abs/2201.02986 (2022) - 2021
- [j6]Yueqiang Cheng, Zhi Zhang, Surya Nepal, Zhi Wang:
CATTmew: Defeating Software-Only Physical Kernel Isolation. IEEE Trans. Dependable Secur. Comput. 18(4): 1989-2004 (2021) - [j5]Zhi Zhang, Yueqiang Cheng, Yansong Gao, Surya Nepal, Dongxi Liu, Yi Zou:
Detecting Hardware-Assisted Virtualization With Inconspicuous Features. IEEE Trans. Inf. Forensics Secur. 16: 16-27 (2021) - [j4]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE Trans. Inf. Forensics Secur. 16: 5167-5181 (2021) - [c34]Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. ACSAC 2021: 609-619 - [c33]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CCS 2021: 1237-1253 - [c32]Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - [c31]Wei Huang, Shengjie Xu, Yueqiang Cheng, David Lie:
Aion Attacks: Manipulating Software Timers in Trusted Execution Environment. DIMVA 2021: 173-193 - [c30]Yanan Guo, Liang Liu, Yueqiang Cheng, Youtao Zhang, Jun Yang:
ModelShield: A Generic and Portable Framework Extension for Defending Bit-Flip based Adversarial Weight Attacks. ICCD 2021: 559-562 - [c29]Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, Tao Wei:
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets. NDSS 2021 - [c28]Yanan Guo, Andrew Zigerelli, Yueqiang Cheng, Youtao Zhang, Jun Yang:
Performance-Enhanced Integrity Verification for Large Memories. SEED 2021: 50-62 - [c27]Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. USENIX Security Symposium 2021: 717-732 - [c26]Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. USENIX Security Symposium 2021: 1973-1988 - [i17]Yiru Zhao, Ruiheng Shi, Lei Zhao, Yueqiang Cheng:
AlphaFuzz: Evolutionary Mutation-based Fuzzing as Monte Carlo Tree Search. CoRR abs/2101.00612 (2021) - [i16]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. CoRR abs/2102.10269 (2021) - [i15]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. CoRR abs/2107.08367 (2021) - 2020
- [j3]Shengjian Guo, Yueqi Chen, Jiyong Yu, Meng Wu, Zhiqiang Zuo, Peng Li, Yueqiang Cheng, Huibo Wang:
Exposing cache timing side-channel leaks through out-of-order symbolic execution. Proc. ACM Program. Lang. 4(OOPSLA): 147:1-147:32 (2020) - [c25]Zhangkai Zhang, Yueqiang Cheng, Zhoujun Li:
Super Root: A New Stealthy Rooting Technique on ARM Devices. ACNS (2) 2020: 344-363 - [c24]Mustakimur Rahman Khandaker, Yueqiang Cheng, Zhi Wang, Tao Wei:
COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX. ASPLOS 2020: 971-985 - [c23]Minghua Wang, Zhi Zhang, Yueqiang Cheng, Surya Nepal:
DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping. DAC 2020: 1-6 - [c22]Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo:
SpecuSym: speculative symbolic execution for cache timing leak detection. ICSE 2020: 1235-1247 - [c21]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41 - [c20]Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao:
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. USENIX Security Symposium 2020: 967-984 - [i14]Zhi Zhang, Yueqiang Cheng, Yinqian Zhang, Surya Nepal:
GhostKnight: Breaching Data Integrity via Speculative Execution. CoRR abs/2002.00524 (2020) - [i13]Minghua Wang, Zhi Zhang, Yueqiang Cheng, Surya Nepal:
DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping. CoRR abs/2004.02354 (2020) - [i12]Tianhao Wang, Joann Qiongna Chen, Zhikun Zhang, Dong Su, Yueqiang Cheng, Zhou Li, Ninghui Li, Somesh Jha:
Continuous Release of Data Streams under both Centralized and Local Differential Privacy. CoRR abs/2005.11753 (2020) - [i11]Yuankun Zhu, Yueqiang Cheng, Husheng Zhou, Yantao Lu:
Hermes Attack: Steal DNN Models with Lossless Inference Accuracy. CoRR abs/2006.12784 (2020) - [i10]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020)
2010 – 2019
- 2019
- [c19]Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. AsiaCCS 2019: 114-121 - [c18]Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng:
Adaptive Call-Site Sensitive Control Flow Integrity. EuroS&P 2019: 95-110 - [c17]Peng Qin, Cheng Tan, Lei Zhao, Yueqiang Cheng:
Defending against ROP Attacks with Nearly Zero Overhead. GLOBECOM 2019: 1-6 - [c16]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. USENIX Security Symposium 2019: 1239-1256 - [i9]Xiaoxuan Lou, Fan Zhang, Zheng Leong Chua, Zhenkai Liang, Yueqiang Cheng, Yajin Zhou:
Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework. CoRR abs/1901.03538 (2019) - [i8]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - [i7]Zhi Zhang, Yueqiang Cheng:
PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines. CoRR abs/1910.09277 (2019) - [i6]Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo:
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak Detection. CoRR abs/1911.00507 (2019) - [i5]Xiaolan Gu, Ming Li, Yueqiang Cheng, Li Xiong, Yang Cao:
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility. CoRR abs/1911.12834 (2019) - [i4]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang:
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique. CoRR abs/1912.03076 (2019) - 2018
- [c15]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels. RAID 2018: 691-710 - [i3]Yueqiang Cheng, Zhi Zhang, Surya Nepal:
Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation. CoRR abs/1802.07060 (2018) - [i2]Zhi Zhang, Yueqiang Cheng, Surya Nepal, Dongxi Liu, Qingni Shen, Fethi A. Rabhi:
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS. CoRR abs/1802.07062 (2018) - [i1]Jinwen Wang, Yueqiang Cheng, Qi Li, Yong Jiang:
Interface-Based Side Channel Attack Against Intel SGX. CoRR abs/1811.05378 (2018) - 2017
- [j2]Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, Lina Wang:
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level. J. Syst. Softw. 124: 153-168 (2017) - [c14]Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng:
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. ACSAC 2017: 425-436 - [c13]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c12]Yu Ding, Ran Duan, Long Li, Yueqiang Cheng, Yulong Zhang, Tanghui Chen, Tao Wei, Huibo Wang:
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave. CCS 2017: 2491-2493 - [c11]Zhe Wang, Chenggang Wu, Jianjun Li, Yuanming Lai, Xiangyu Zhang, Wei-Chung Hsu, Yueqiang Cheng:
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks. VEE 2017: 143-156 - 2016
- [c10]Zhi Zhang, Yueqiang Cheng:
PiBooster: Performance Accelerations in Page Table Management for Paravirtual VMs. CLOUD 2016: 513-520 - 2015
- [c9]Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
Efficient Virtualization-Based Application Protection Against Untrusted Operating System. AsiaCCS 2015: 345-356 - [c8]Lei Zhao, Run Wang, Lina Wang, Yueqiang Cheng:
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis. COMPSAC 2015: 434-443 - [c7]Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen:
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. SecureComm 2015: 193-211 - [c6]Yanlin Li, Yueqiang Cheng, Virgil D. Gligor, Adrian Perrig:
Establishing Software-Only Root of Trust on Embedded Systems: Facts and Fiction. Security Protocols Workshop 2015: 50-68 - 2014
- [c5]Yueqiang Cheng, Zongwei Zhou, Miao Yu, Xuhua Ding, Robert H. Deng:
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks. NDSS 2014 - 2013
- [j1]Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows. ACM Trans. Inf. Syst. Secur. 16(2): 6 (2013) - [c4]Yueqiang Cheng, Xuhua Ding:
Guardian: Hypervisor as Security Foothold for Personal Computers. TRUST 2013: 19-36 - 2012
- [c3]Yueqiang Cheng, Xuhua Ding:
Virtualization Based Password Protection against Malware in Untrusted Operating Systems. TRUST 2012: 201-218 - 2011
- [c2]Yueqiang Cheng, Xuhua Ding, Robert H. Deng:
DriverGuard: A Fine-Grained Protection on I/O Flows. ESORICS 2011: 227-244
2000 – 2009
- 2009
- [c1]Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert H. Deng, Yao Guo, Weizhong Shao:
Remote Attestation on Function Execution (Work-in-Progress). INTRUST 2009: 60-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint