SW Security ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks, ACM Conference on Computer and Communications Security (CCS), Oct 2015
|
SW Security Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015
|
HW Security Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines, ACM Transactions on Design Automation of Electronic Systems (TODAES), Sep 2015
|
SW Security Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015
|
HW Security Accelerating Bootstrapping in FHEW using GPUs, The 26th IEEE International Conference on Application-specific Systems, Architectures and Processors, IEEE ASAP Conference, Jul 2015(Acceptance rate: 24.7%)
|
HW Security Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices, In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Jun 2015
|
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Jun 2015
|
HW Security Efficient Dynamic Information Flow Tracking on a Processor with Core Debug Interface, Design Automation Conference (DAC), Jun 2015 (Acceptance rate: 20.5%)
|
SW Security Understanding Malvertising Through Ad-Injecting Browser Extensions, International Conference on World Wide Web (WWW), May 2015
|
Mobile Cloud Computing Precise Execution Offloading for Applications with Dynamic Behavior in Mobile Cloud Computing, Pervasive and Mobile Computing, Apr 2015
|
HW Security EXTRAX: Security Extention To Extract Cache Resident Information For Snoop-based External Monitors, Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2015 (Acceptance rate: 22.4%)
|
SW Security Preventing Use-after-free with Dangling Pointers Nullification, Network and Distributed System Security Symposium (NDSS), Feb 2015
|
HW Security Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors, Journal of Semiconductor Technology and Science, JSTS-2014-035.R1, Feb 2015
|
Mobile Cloud Computing Reduction of Media Servers Overload with Energy-Saving Adaptive Streaming, Global IT Conference, Jan 2015
|
Mobile Cloud Computing Techniques to Minimize State Transfer Costs for Dynamic Execution Offloading in Mobile Cloud Computing, IEEE Transactions on Mobile Computing, Nov 2014
|
Software Optimization and Reconstruction Modulo Scheduler Implementation for VLIW Processor, International SoC Design Conference (ISOCC) Nov 2014
|
Application Specific Architectures A Study of Burst Transfer Generation, The 9th KIPS International Conference on Ubiquitous Information Technologies and Applications(CUTE), 2014
|
HW Security CPU Security Extensions to Eliminate Cache Effect for Snoop-based Kernel Integrity Monitor, 51st IEEE/ACM Design Automation Conference, DAC WIP'14, Jun 2014
|
SW Security From Zygote to Morula: Fortifying weakened ASLR on Android, IEEE Symposium on Security and Privacy (Oakland), May 2014
|
Mobile Cloud Computing CMcloud: Cloud Platform for Cost-Effective Offloading of Mobile Applications , 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, May 2014 (Acceptance rate: 19%)
|