Fengwei Zhang
Fengwei Zhang
Associate Professor, Southern University of Science and Technology
Geverifieerd e-mailadres voor sustech.edu.cn - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
682013
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
622015
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014
572014
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
K Sun, J Wang, F Zhang, A Stavrou
542012
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
European Symposium on Research in Computer Security, 219-238, 2014
432014
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics
J Wang, F Zhang, K Sun, A Stavrou
352011
Ninja: Towards Transparent Tracing and Debugging on {ARM}
Z Ning, F Zhang
26th {USENIX} Security Symposium ({USENIX} Security 17), 33-49, 2017
302017
SoK: A study of using hardware-assisted isolated execution environments for security
F Zhang, H Zhang
Proceedings of the Hardware and Architectural Support for Security and …, 2016
232016
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
222015
Temporal metrics for software vulnerabilities
JA Wang, F Zhang, M Xia
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
222008
A comparison study of intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
212018
Metrics for information security vulnerabilities
JA Wang, M Xia, F Zhang
Journal of Applied Global Research 1 (1), 48-58, 2008
202008
TrustLogin: Securing Password-Login on Commodity Operating Systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
182015
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
J Li, X Tong, F Zhang, J Ma
IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018
172018
Breaking BLE beacons for fun but mostly profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
132017
Towards transparent introspection
K Leach, C Spensky, W Weimer, F Zhang
2016 IEEE 23rd International Conference on Software Analysis, Evolution, and …, 2016
132016
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage
K Leach, F Zhang, W Weimer
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
112017
Position paper: Challenges towards securing hardware-assisted execution environments
Z Ning, F Zhang, W Shi, W Shi
Proceedings of the Hardware and Architectural Support for Security and …, 2017
112017
IOCheck: A framework to enhance the security of I/O devices at runtime
F Zhang
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks …, 2013
112013
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
Z Ning, J Liao, F Zhang, W Shi
2018 IEEE/ACM Symposium on Edge Computing (SEC), 421-426, 2018
82018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20