Wenhao Wang
Title
Cited by
Cited by
Year
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
2752017
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
602018
A community effort to protect genomic data sharing, collaboration and outsourcing
S Wang, X Jiang, H Tang, X Wang, D Bu, K Carey, SOM Dyke, D Fox, ...
NPJ genomic medicine 2 (1), 1-6, 2017
302017
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
M Liu, J Yang, W Wang, D Lin
37th Annual International Conference on the Theory and Applications of …, 2018
252018
Enabling rack-scale confidential computing using heterogeneous trusted execution environment
J Zhu, R Hou, XF Wang, W Wang, J Cao, B Zhao, Z Wang, Y Zhang, ...
2020 IEEE Symposium on Security and Privacy (SP), 1450-1465, 2020
23*2020
Searching cubes for testing Boolean functions and its application to Trivium
M Liu, D Lin, W Wang
2015 IEEE International Symposium on Information Theory (ISIT), 496-500, 2015
172015
Bluethunder: A 2-level directional predictor based side-channel attack against sgx
T Huo, X Meng, W Wang, C Hao, P Zhao, J Zhai, M Li
IACR Transactions on Cryptographic Hardware and Embedded Systems, 321-347, 2020
162020
iDASH secure genome analysis competition 2017
XF Wang, H Tang, S Wang, X Jiang, W Wang, D Bu, L Wang, Y Jiang, ...
BMC medical genomics 11 (4), 1-2, 2018
122018
Toward scalable fully homomorphic encryption through light trusted computing assistance
W Wang, Y Jiang, Q Shen, W Huang, H Chen, S Wang, XF Wang, H Tang, ...
arXiv preprint arXiv:1905.07766, 2019
102019
Binary code retrofitting and hardening using SGX
S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017
82017
Randomized last-level caches are still vulnerable to cache side-channel attacks! But we can fix it
W Song, B Li, Z Xue, Z Li, W Wang, P Liu
arXiv preprint arXiv:2008.01957, 2020
62020
Improvement and analysis of VDP method in time/memory tradeoff applications
W Wang, D Lin, Z Li, T Wang
International Conference on Information and Communications Security, 282-296, 2011
52011
Comments on “A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation”
W Wang, M Liu, Y Zhang
Cryptography and Communications 5 (1), 1-6, 2013
42013
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh
Z Zhang, Y Cheng, M Wang, W He, W Wang, N Surya, Y Gao, K Li, ...
arXiv preprint arXiv:2102.10269, 2021
32021
Analysis of multiple checkpoints in non-perfect and perfect rainbow tradeoff revisited
W Wang, D Lin
International Conference on Information and Communications Security, 288-301, 2013
32013
Making a higher hit ratio cryptanalytic time-memory trade-off attack on passwords
J Zou, D Lin, C Hao, Z Li, W Wang, Y Lu
Chinese Journal of Electronics 22 (4), 2013
32013
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying’s Attack
Z Li, Y Lu, W Wang, B Zhang, D Lin
International Conference on Information and Communications Security, 311-320, 2012
22012
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability
Z Zhang, W He, Y Cheng, W Wang, Y Gao, M Wang, K Li, S Nepal, ...
IEEE Transactions on Information Forensics and Security 16, 5167-5181, 2021
12021
Practical and Efficient in-Enclave Verification of Privacy Compliance
W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ...
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
12021
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection
Z Zhou, D Tang, W Wang, X Wang, Z Li, K Zhang
Proceedings of the 34th Annual Computer Security Applications Conference, 77-88, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20