Biblio

Export 19 results:
Filters: Author is Zhiqiang Lin  [Clear All Filters]
2021
Li X, Chen Y, Lin Z, Wang X, Chen JHao.  2021.  Automatic Policy Generation for Inter-Service Access Control of Microservices. 30th USENIX Security Symposium (USENIX Security 21). :3971--3988.
Chen S, Lin Z, Zhang Y.  2021.  SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. 30th USENIX Security Symposium (USENIX Security 21). :1665--1682.
Jangid MKumar, Chen G, Zhang Y, Lin Z.  2021.  Towards Formal Verification of State Continuity for Enclave Programs. 30th USENIX Security Symposium (USENIX Security 21). :573--590.
2019
Alrawi O, Zuo C, Duan R, Kasturi RPai, Lin Z, Saltaformaggio B.  2019.  The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile Backends. 28th USENIX Security Symposium (USENIX Security 19). :551--566.
Xu X, Ghaffarinia M, Wang W, Hamlen KW, Lin Z.  2019.  CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. 28th USENIX Security Symposium (USENIX Security 19). :1805--1821.
Li M, Zhang Y, Lin Z, Solihin Y.  2019.  Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization. 28th USENIX Security Symposium (USENIX Security 19). :1257--1272.
Wang W, Zhang Y, Lin Z.  2019.  Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :443--457.
2018
Silvestro S, Liu H, Liu T, Lin Z, Liu T.  2018.  Guarder: A Tunable Secure Allocator. 27th USENIX Security Symposium (USENIX Security 18). :117--133.
Tu Y, Lin Z, Lee I, Hei X.  2018.  Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors. 27th USENIX Security Symposium (USENIX Security 18). :1545--1562.
2014
Fu Y, Zeng J, Lin Z.  2014.  HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management. 2014 USENIX Annual Technical Conference (USENIX ATC 14). :85--96.
Pattuk E, Kantarcioglu M, Lin Z, Ulusoy H.  2014.  Preventing Cryptographic Key Leakage in Cloud Virtual Machines. 23rd USENIX Security Symposium (USENIX Security 14). :703--718.
Peng F, Deng Z, Zhang X, Xu D, Lin Z, Su Z.  2014.  X-Force: Force-Executing Binary Programs for Security Applications. 23rd USENIX Security Symposium (USENIX Security 14). :829--844.