Följ
Guoxing Chen
Guoxing Chen
Assistant Professor of Computer Science & Engineering Department, Shanghai Jiao Tong University
Verifierad e-postadress på cs.sjtu.edu.cn - Startsida
Titel
Citeras av
Citeras av
År
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
4772019
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4742017
Sgxpectre attacks: Leaking enclave secrets via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
arXiv preprint arXiv:1802.09085, 2018
1572018
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
1032018
Differentially private access patterns for searchable symmetric encryption
G Chen, TH Lai, MK Reiter, Y Zhang
IEEE INFOCOM 2018-IEEE conference on computer communications, 810-818, 2018
892018
Crowd-ML: A privacy-preserving learning framework for a crowd of smart devices
J Hamm, AC Champion, G Chen, M Belkin, D Xuan
2015 IEEE 35th International Conference on Distributed Computing Systems, 11-20, 2015
792015
Fingerprinting deep neural networks globally via universal adversarial perturbations
Z Peng, S Li, G Chen, C Zhang, H Zhu, M Xue
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2022
712022
Opera: Open remote attestation for intel's secure enclaves
G Chen, Y Zhang, TH Lai
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
652019
{MAGE}: Mutual attestation for a group of enclaves without trusted third parties
G Chen, Y Zhang
31st USENIX Security Symposium (USENIX Security 22), 4095-4110, 2022
282022
On degrees of freedom of cognitive networks with user cooperation
G Chen, Z Xiang, C Xu, M Tao
IEEE Wireless Communications Letters 1 (6), 617-620, 2012
242012
Towards formal verification of state continuity for enclave programs
MK Jangid, G Chen, Y Zhang, Z Lin
30th USENIX Security Symposium (USENIX Security 21), 573-590, 2021
212021
Defeating speculative-execution attacks on SGX with HyperRace
G Chen, M Li, F Zhang, Y Zhang
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
192019
Reusable enclaves for confidential serverless computing
S Zhao, P Xu, G Chen, M Zhang, Y Zhang, Z Lin
32nd USENIX Security Symposium (USENIX Security 23), 4015-4032, 2023
182023
Mobile data collection frameworks: A survey
PY Cao, G Li, G Chen, B Chen
Proceedings of the 2015 Workshop on Mobile Big Data, 25-30, 2015
152015
Secure hierarchical deterministic wallet supporting stealth address
X Yin, Z Liu, G Yang, G Chen, H Zhu
European Symposium on Research in Computer Security, 89-109, 2022
112022
Flash-Loc: Flashing mobile phones for accurate indoor localization
F Yang, Q Zhai, G Chen, AC Champion, J Zhu, D Xuan
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
102016
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing
W Wang, G Chen, Y Cheng, Y Zhang, Z Lin
Detection of Intrusions and Malware, and Vulnerability Assessment: 18th …, 2021
92021
RAI2: Responsible Identity Audit Governing the Artificial Intelligence.
T Dong, S Li, G Chen, M Xue, H Zhu, Z Liu
NDSS, 2023
82023
Unleashing cheapfakes through trojan plugins of large language models
T Dong, G Chen, S Li, M Xue, R Holland, Y Meng, Z Liu, H Zhu
arXiv preprint arXiv:2312.00374, 2023
72023
{POLICYCOMP}: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
L Zhou, C Wei, T Zhu, G Chen, X Zhang, S Du, H Cao, H Zhu
32nd USENIX Security Symposium (USENIX Security 23), 1073-1090, 2023
62023
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20