Sprobes: Enforcing kernel code integrity on the trustzone architecture X Ge, H Vijayakumar, T Jaeger Proceedings of the 3rd IEEE Mobile Security Technologies Workshop (MoST), 2014 | 174 | 2014 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 151 | 2017 |
Griffin: Guarding control flows using intel processor trace X Ge, W Cui, T Jaeger Proceedings of the 22nd ACM International Conference on Architectural …, 2017 | 148 | 2017 |
Fine-grained control-flow integrity for kernel software X Ge, N Talele, M Payer, T Jaeger Proceedings of the 1st IEEE European Symposium on Security and Privacy, 179-194, 2016 | 139 | 2016 |
REPT: Reverse Debugging of Failures in Deployed Software W Cui, X Ge, B Kasikci, B Niu, U Sharma, R Wang, I Yun Proceedings of the 13th USENIX Symposium on Operating Systems Design and …, 2018 | 91 | 2018 |
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. H Vijayakumar, X Ge, M Payer, T Jaeger Proceedings of the 23rd USENIX Security Symposium, 973-988, 2014 | 40 | 2014 |
Lazy Diagnosis of In-Production Concurrency Bugs B Kasikci, W Cui, X Ge, B Niu Proceedings of the 26th Symposium on Operating Systems Principles, 582-598, 2017 | 38 | 2017 |
A new prediction approach based on linear regression for collaborative filtering X Ge, J Liu, Q Qi, Z Chen Proceedings of the 8th International Conference on Fuzzy Systems and …, 2011 | 25 | 2011 |
An evil copy: How the loader betrays you X Ge, M Payer, T Jaeger Proceedings of the 21st Network and Distributed System Security Symposium 15, 2017 | 24 | 2017 |
Pileus: Protecting user resources from vulnerable cloud services Y Sun, G Petracca, X Ge, T Jaeger Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 18 | 2016 |
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018 | 17 | 2018 |
Reverse debugging of kernel failures in deployed systems X Ge, B Niu, W Cui 2020 USENIX Annual Technical Conference (USENIX ATC 20), 281-292, 2020 | 15 | 2020 |
HYPERFUZZER: An efficient hybrid fuzzer for virtual cpus X Ge, B Niu, R Brotzman, Y Chen, HS Han, P Godefroid, W Cui Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 5 | 2021 |
Embedding code contexts for cryptographic api suggestion: New methodologies and comparisons Y Xiao, S Ahmed, W Song, X Ge, B Viswanath, D Yao arXiv preprint arXiv:2103.08747, 2021 | 5 | 2021 |
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud X Ge, HC Kuo, W Cui Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 4 | 2022 |
Core slicing: closing the gap between leaky confidential VMs and baremetal cloud Z Zhou, Y Shan, W Cui, X Ge, M Peinado, A Baumann Proceedings of the 17th Symposium on Operating System Design and …, 2023 | 2 | 2023 |
Reverse debugging of software failures W Cui, X Ge, BCC Kasikci, B Niu, R Wang, I Yun US Patent 10,565,511, 2020 | 2 | 2020 |
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory J Yu, X Ge, T Jaeger, CW Fletcher, W Cui 2022 IEEE International Symposium on Secure and Private Execution …, 2022 | 1 | 2022 |
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer T Jaeger, X Ge, D Muthukumaran, S Rueda, J Schiffman, H Vijayakumar Security, Privacy, and Applied Cryptography Engineering: 5th International …, 2015 | 1 | 2015 |
Measurement of Embedding Choices on Cryptographic API Completion Tasks Y Xiao, W Song, S Ahmed, X Ge, B Viswanath, N Meng, D Yao ACM Transactions on Software Engineering and Methodology, 2023 | | 2023 |