Follow
Xueyang Wang
Xueyang Wang
Alibaba Group
Verified email at nyu.edu
Title
Cited by
Cited by
Year
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
3982016
Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters
X Wang, R Karri
Proceedings of the 50th Annual Design Automation Conference, 1-7, 2013
1432013
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015
1172015
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-flow Modifying Rootkits
X Wang, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2016
902016
BRAIN: BehavioR based Adaptive Intrusion detection in Networks: Using Hardware Performance Counters to detect DDoS Attacks
V Jyothi, X Wang, SK Addepalli, R Karri
The 29th International Conference on VLSI Design, 2016
702016
Hardware performance counter-based malware identification and detection with adaptive compressive sensing
X Wang, S Chai, M Isnardi, S Lim, R Karri
ACM Transactions on Architecture and Code Optimization (TACO) 13 (1), 1-23, 2016
692016
Malicious firmware detection with hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ...
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016
572016
Magic: Malicious aging in circuits/cores
N Karimi, AK Kanuparthi, X Wang, O Sinanoglu, R Karri
ACM Transactions on Architecture and Code Optimization (TACO) 12 (1), 1-25, 2015
492015
SIGDROP: Signature-based ROP detection using hardware performance counters
X Wang, J Backer
arXiv preprint arXiv:1609.02667, 2016
242016
Two sides of the same coin: Boons and banes of machine learning in hardware security
W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …, 2021
92021
Detecting kernel control-flow modifying rootkits
X Wang, R Karri
Network Science and Cybersecurity, 177-187, 2013
72013
Methodology of assessing information leakage through software-accessible telemetries
C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
52021
Numchecker: A System Approach for Kernel Rootkit Detection
X Wang, X Guo
Black Hat Asia 2016, 2016
52016
The industrial control systems cyber security landscape
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
IEEE Ind. Electron. Mag, 2016
42016
HPC-based malware detectors actually work: Transition to practice after a decade of research
C Konstantinou, X Wang, P Krishnamurthy, F Khorrami, M Maniatakos, ...
IEEE Design & Test 39 (4), 23-32, 2022
22022
OPAL: On-the-go Physical Attack Lab to Evaluate Power Side-channel Vulnerabilities on FPGAs
R Elnaggar, S Ray, M Sabbagh, B Yuce, T Wang, J Fung
2021 IEEE Physical Assurance and Inspection of Electronics (PAINE), 1-8, 2021
22021
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
CSAW Embedded System Challenge, 2011
22011
Reusing Hardware Performance Counters for System Security
X Wang
http://search.proquest.com/docview/1776488413, 2016
2016
ConFirm
X Wang, C Konstantinou, M Maniatakos, R Karri
2015
The system can't perform the operation now. Try again later.
Articles 1–19