Yulong Zhang
Yulong Zhang
Verified email at google.com
Title
Cited by
Cited by
Year
Incentive compatible moving target defense against vm-colocation attacks in clouds
Y Zhang, M Li, K Bai, M Yu, W Zang
IFIP international information security conference, 388-399, 2012
1082012
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 945-959, 2015
992015
Adaptive android kernel live patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
26th {USENIX} Security Symposium ({USENIX} Security 17), 1253-1270, 2017
482017
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
432015
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
342017
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
302019
Improving virtualization security by splitting hypervisor into smaller components
W Pan, Y Zhang, M Yu, J Jing
IFIP Annual Conference on Data and Applications Security and Privacy, 298-313, 2012
302012
Savior: Towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020
282020
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
M Li, Y Zhang, K Bai, W Zang, M Yu, X He
SECRYPT, 321-326, 2012
282012
Poster: Rust SGX SDK: Towards memory safety in Intel SGX enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
272017
Adaptive kernel live patching: An open collaborative effort to ameliorate android n-day root exploits
Y Zhang, Y Chen, C Bao, L Xia, L Zhen, Y Lu, T Wei, X Baidu
Proceedings of Black Hat USA, 2016
162016
Enpublic apps: Security threats using iOS enterprise and developer certificates
M Zheng, H Xue, Y Zhang, T Wei, JCS Lui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
162015
Sidewinder: Targeted attack against Android in the golden age of ad libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
Black Hat 14, 2014
152014
Quantitative survivability evaluation of three virtual machine-based server architectures
Y Yang, Y Zhang, AH Wang, M Yu, W Zang, P Liu, S Jajodia
Journal of network and computer applications 36 (2), 781-790, 2013
102013
Hypebios: Enforcing vm isolation with minimized and decomposed cloud tcb
Y Zhang, W Pan, Q Wang, K Bai, M Yu
Virginia Commonwealth University, Technical report, 2012
102012
Accurate and efficient exploit capture and classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Science China Information Sciences 60 (5), 1-17, 2017
72017
Automatic Hot Patch Generation for Android Kernels
Z Xu, Y Zhang, L Zheng, L Xia, C Bao, Z Wang, Y Liu
29th {USENIX} Security Symposium ({USENIX} Security 20), 2397-2414, 2020
62020
SSL Vulnerabilities: Who Listens When Android Applications Talk
A Mettler, Y Zhang, V Raman
August, 2014
62014
To swipe or not to swipe: A challenge for your fingers
Y Zhang, T Wei
RSA Conference, USA, 2015
52015
Apple without a shell–iOS under targeted attack
T Wei, M Zheng, H Xue, D Song
Virus Bulletin Conference, 2014
52014
The system can't perform the operation now. Try again later.
Articles 1–20