Zhiqiang Lin [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Stealing Intel Secrets from SGX Enclaves via Speculative Execution IEEEEuroS&P-2019 - Stockholm, Sweden
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps IEEESymposium-2019 - San Francisco, US
Guarder: A Tunable Secure Allocator 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Guarder: A Tunable Secure Allocator 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
Injected and Delivered: Fabricating Implicit Control over Actuation Systems by Spoofing Inertial Sensors 27thUsenixSecuritySymposium-2018 - Vancouver, Canada
IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing. NDSS-2018 - san diego,usa
Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics. NDSS-2018 - san diego,usa
Automatic Forgery of Cryptographically Consistent Messages to Identify Security Vulnerabilities in Mobile Services NDSS-2016 - california,usa
You Shouldn’t Collect My Secrets: Thwarting Sensitive Keystroke Leakage in Mobile IME Apps SecuritySymposium-2015 - washington,USA
PEMU: A Pin Highly Compatible Out-of-VM Dynamic Binary Instrumentation Framework VEE-2015 - Istanbul,Turkey
M4. Introduction to Virtual Machine Introspection ACSAC-2014 - new orleans,usa
MACE: High-Coverage and Robust Memory Analysis For Commodity Operating Systems ACSAC-2014 - new orleans,usa
Mobile Systems Security II ACSAC-2014 - new orleans,usa
A Systematic Study of the Covert-Channel Attacks in Smartphones SecureComm-2014 - bejing,china
GOLDENEYE: Efficiently and Effectively Unveiling Malware’s Targeted Environment Raid-2014 - gottenburg,sweden
Preventing Cryptographic Key Leakage in Cloud Virtual Machines usenix-2014 - san diego,usa
X-Force: Force-Executing Binary Programs for Security Applications usenix-2014 - san diego,usa
HYPERSHELL: A Practical Hypervisor Layer Guest OS Shell for Automated In-VM Management USENIXatc-2014 - Philadelphia,USA
Hybrid-Bridge: Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization NDSS-2014 - San Diego,USA
SMV-Hunter: Large Scale, Automated Detection of SSL/TLS Man-in-the-Middle Vulnerabilities in Android Apps NDSS-2014 - San Diego,USA
Subverting System Authentication Using Context-Aware, Reactive Virtual Machine Introspection ACSAC-2013 - New Orleans, USA