HW Security Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hardware and Architectural Support for Security and Privacy (HASP), Jun 2016
|
HW Security A Hardware-based Technique for Efficient Implicit Information Flow Tracking, Design Automation Conference (DAC) WIP, Jun 2016
|
HW Security HDFI: Hardware-Assisted Data-flow Isolation, IEEE S&P , May 2016 (Acceptance rate: 13.3%)
|
SW Security TrackMeOrNot: Enabling Flexible Control on Web Tracking, International Conference on World Wide Web (WWW), April 2016
|
HW Security Integration of ROP/JOP Monitoring IPs in an ARM-based SoC Design Automation and Test in Europe Conference and Exhibition (DATE), Mar 2016 (Acceptance rate: 24%)
|
Mobile Cloud Computing Energy-Reduction Offloading Technique for Streaming Media Servers, Mobile Information Systems, Mar 2016
|
SW Security Enforcing Kernel Security Invariants with Data Flow Integrity, Network and Distributed System Security Symposium (NDSS), Feb 2016
|
Application Specific Architectures Software-based Selective Validation Techniques for Robust CGRAs against Soft Errors, Transactions on Embedded Computing Systems, VOL.15, NO.20, Feb 2016
|
HW Security 3D User Signature System Using Location Tracking Techniques, Global IT Conference, Jan 2016
|
Mobile Cloud Computing Energy Consumption Reduction Technique on Smart Devices for Communication-intensive Applications, Ubiquitous Information Techniques and Applications(CUTE), Dec 2015
|
Mobile Cloud Computing An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, International Conference on Network, Communication and Computing(ICNCC), Dec 2015
|
Application Specific Architectures Scalable Application Mapping for SIMD Reconfigurable Architecture, JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.15, NO.6, JSTS, Dec 2015
|
HW Security The new real-time debug interface for efficient code reuse attack detection, 2015 International SoC Design Conference (ISOCC), 93-94, Nov 2015
|
SW Security ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks, ACM Conference on Computer and Communications Security (CCS), Oct 2015
|
SW Security Cross-checking Semantic Correctness: The Case of Finding File System Bugs, ACM Symposium on Operating Systems Principles (SOSP), Oct 2015
|
HW Security Implementing an Application-Specific Instruction-Set Processor for System-Level Dynamic Program Analysis Engines, ACM Transactions on Design Automation of Electronic Systems (TODAES), Sep 2015
|
SW Security Type Casting Verification: Stopping an Emerging Attack Vector, Usenix Security Symposium (Security), August 2015
|
HW Security Accelerating Bootstrapping in FHEW using GPUs, The 26th IEEE International Conference on Application-specific Systems, Architectures and Processors, IEEE ASAP Conference, Jul 2015(Acceptance rate: 24.7%)
|
HW Security Towards a Practical Solution to Detect Code Reuse Attacks on ARM Mobile Devices, In Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP, Jun 2015
|
HW Security Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Jun 2015
|