关注
Chi-Wei  Wang
Chi-Wei Wang
National Chiao Tung University
在 mediatek.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
IoT security: ongoing challenges and research opportunities
ZK Zhang, MCY Cho, CW Wang, CW Hsu, CK Chen, S Shieh
2014 IEEE 7th international conference on service-oriented computing and …, 2014
9722014
Method of generating in-kernel hook point candidates to detect rootkits and the system thereof
W Chi-Wei, C Chen, CW Wang, S Shieh
US Patent 9,747,452, 2017
382017
Light weight authentication and secret retrieval
S Huang, SP Shieh, SM Chang, W Chi-Wei
US Patent 8,595,504, 2013
172013
DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis.
CW Wang, SW Shieh
J. Inf. Sci. Eng. 31 (1), 111-129, 2015
132015
Reliability and security of large scale data storage in cloud computing
CW Hsu, CW Wang, S Shieh
The Reliability Society 2010 Annual Technical Report, 1-7, 2010
112010
Light-weight CSRF protection by labeling user-created contents
YC Sung, MCY Cho, CW Wang, CW Hsu, SW Shieh
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
92013
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations.
CW Wang, SW Shieh
J. Inf. Sci. Eng. 31 (4), 1413-1429, 2015
62015
MrKIP: Rootkit Recognition with Kernel Function Invocation Pattern.
CW Wang, CK Chen, CW Wang, SW Shieh
J. Inf. Sci. Eng. 31 (2), 455-473, 2015
62015
Divergence detector: A fine-grained approach to detecting vm-awareness malware
CW Hsu, FS Shih, CW Wang, SW Shieh
2013 IEEE 7th International Conference on Software Security and Reliability …, 2013
62013
Combating software piracy in public clouds
CW Wang, MCY Cho, CW Wang, SW Shieh
Computer 48 (10), 88-91, 2015
52015
Decoupled method for tracking information flow and computer system thereof
W Chi-Wei, SP Shieh, YJ Liu
US Patent 9,304,792, 2016
32016
ProbeBuilder: Uncovering opaque kernel data structures for automatic probe construction
CW Wang, CW Wang, S Shieh
IEEE Transactions on Dependable and Secure Computing 13 (5), 568-581, 2015
32015
Automatic probe construction system and method thereof
S Shieh, W Chi-Wei, CW Wang, CW Hsu
US Patent 9,898,257, 2018
12018
Can Malware Be Exterminated by Better Understanding Its Roots?
MCY Cho, CW Hsu, S Shieh, CW Wang
IT Professional 16 (6), 47-53, 2014
12014
Cloudebug: A Programmable Online Malware Testbed
CW Wang, CW Wang, CA Hsieh, SW Shieh
Computer 47 (7), 90-92, 2014
12014
DROIT+: Taint Tracking for Storage Access on Android.
CW Hsu, CH Chang, CW Wang, S Shieh
Journal of Information Science & Engineering 33 (5), 2017
2017
Malware Behavior Analysis Based on Virtual Machine Introspection and Snapshot Comparison
CW Hsu, CW Wang, CW Wang
20th Cryptology and Information Security Conference (CISC 2010), 2010
2010
The Evolution of Fine-Grain Malware Behavior Analysis, From Static to Dynamic
CW Wang, S Shieh
DROIT+: Taint Tracking for Storage Access on Android
C CHANG, C WANG, S SHIEH
系统目前无法执行此操作,请稍后再试。
文章 1–19