CSpace

浏览/检索结果: 共8条,第1-8条 帮助

已选(0)清除 条数/页:   排序方式:
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:  Tang, Bowen;  Wu, Chenggang;  Yew, Pen-Chung;  Zhang, Yinqian;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Wang, Wei;  Wei, Qiang;  Wang, Zhe
收藏  |  浏览/下载:8/0  |  提交时间:2024/05/20
Resource contention  scheduling strategy  simultaneous multithreading (SMT)  transient execution attack (TEA)  
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:  Wu, Chenggang;  Xie, Mengyao;  Wang, Zhe;  Zhang, Yinqian;  Lu, Kangjie;  Zhang, Xiaofeng;  Lai, Yuanming;  Kang, Yan;  Yang, Min;  Li, Tao
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Codes  Hardware  Kernel  Runtime  Security  Registers  Virtualization  Intra-process memory isolation  Intel supervisor-mode access prevention  
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
Using Local Clocks to Reproduce Concurrency Bugs 期刊论文
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2018, 卷号: 44, 期号: 11, 页码: 1112-1128
作者:  Wang, Zhe;  Wu, Chenggang;  Yuan, Xiang;  Wang, Zhenjiang;  Li, Jianjun;  Yew, Pen-Chung;  Huang, Jeff;  Feng, Xiaobing;  Lan, Yanyan;  Chen, Yunji;  Lai, Yuanming;  Guan, Yong
收藏  |  浏览/下载:73/0  |  提交时间:2019/08/16
Concurrency  bug reproducing  local clock  
HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines 期刊论文
ACM SIGPLAN NOTICES, 2015, 卷号: 50, 期号: 7, 页码: 53-64
作者:  Wang, Zhe;  Li, Jianjun;  Wu, Chenggang;  Yang, Dongyan;  Wang, Zhenjiang;  Hsu, Wei-Chung;  Li, Bin;  Guan, Yong
收藏  |  浏览/下载:57/0  |  提交时间:2019/12/13
Management  Measurement  Performance  Design  Experimentation  Security  memory virtualization  cross-ISA virtualization  Embedded Shadow Page Table  HSPT  Hosted Shadow Page Table  practical implementation  loadable kernel module  Security  Portability  
无权访问的条目 学位论文
作者:  王喆
Adobe PDF(3644Kb)  |  收藏  |  浏览/下载:0/0  |  提交时间:2014/06/25
无权访问的条目 学位论文
作者:  王喆
Adobe PDF(1085Kb)  |  收藏  |  浏览/下载:0/0  |  提交时间:2013/07/10
无权访问的条目 期刊论文
作者:  王家廞;  王喆
Adobe PDF(111Kb)  |  收藏  |  浏览/下载:0/0  |  提交时间:2010/02/05