Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world AM Azab, P Ning, J Shah, Q Chen, R Bhutkar, G Ganesh, J Ma, W Shen Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 381 | 2014 |
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. AM Azab, K Swidowski, R Bhutkar, J Ma, W Shen, R Wang, P Ning NDSS 16, 21-24, 2016 | 114 | 2016 |
Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time W Shen, P Ning, X He, H Dai 2013 IEEE Symposium on Security and Privacy, 174-188, 2013 | 90 | 2013 |
{PeX}: A permission check analysis framework for linux kernel T Zhang, W Shen, D Lee, C Jung, AM Azab, R Wang 28th USENIX Security Symposium (USENIX Security 19), 1205-1220, 2019 | 74 | 2019 |
Is link signature dependable for wireless security? X He, H Dai, W Shen, P Ning 2013 Proceedings IEEE INFOCOM, 200-204, 2013 | 71 | 2013 |
NORAX: Enabling execute-only memory for COTS binaries on AArch64 Y Chen, D Zhang, R Wang, R Qiao, AM Azab, L Lu, H Vijayakumar, ... 2017 IEEE Symposium on Security and Privacy (SP), 304-319, 2017 | 56 | 2017 |
Ptrix: Efficient hardware-assisted fuzzing for cots binary Y Chen, D Mu, J Xu, Z Sun, W Shen, X Xing, L Lu, B Mao Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 50 | 2019 |
Toward proper guard zones for link signature X He, H Dai, W Shen, P Ning, R Dutta IEEE Transactions on Wireless Communications 15 (3), 2104-2117, 2015 | 42 | 2015 |
Spoke: Scalable knowledge collection and attack surface analysis of access control policy for security enhanced android R Wang, AM Azab, W Enck, N Li, P Ning, X Chen, W Shen, Y Cheng Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 38 | 2017 |
MCR decoding: A MIMO approach for defending against wireless jamming attacks W Shen, P Ning, X He, H Dai, Y Liu 2014 IEEE Conference on Communications and Network Security, 133-138, 2014 | 38 | 2014 |
Where are you from? Confusing location distinction using virtual multipath camouflage S Fang, Y Liu, W Shen, H Zhu Proceedings of the 20th annual international conference on Mobile computing …, 2014 | 37 | 2014 |
The security of link signature: A view from channel models X He, H Dai, Y Huang, D Wang, W Shen, P Ning 2014 IEEE conference on communications and network security, 103-108, 2014 | 31 | 2014 |
Virtual multipath attack and defense for location distinction in wireless networks S Fang, Y Liu, W Shen, H Zhu, T Wang IEEE Transactions on Mobile Computing 16 (2), 566-580, 2016 | 27 | 2016 |
Apparatus and method for transparent, secure element-based mediation of on-board diagnostic operations P Ning, SE McLaughlin, MC Grace, AM Azab, R BHUTKAR, W Shen, ... US Patent App. 10/320,745, 2019 | 26* | 2019 |
Demons in the shared kernel: Abstract resource attacks against os-level virtualization N Yang, W Shen, J Li, Y Yang, K Lu, J Xiao, T Zhou, C Qin, W Yu, J Ma, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 18 | 2021 |
An open source web-mapping system for tourism planning and marketing SK Supak, HA Devine, GL Brothers, S Rozier Rich, W Shen Journal of Travel & Tourism Marketing 31 (7), 835-853, 2014 | 18 | 2014 |
Security challenges in the container cloud Y Yang, W Shen, B Ruan, W Liu, K Ren 2021 Third IEEE International Conference on Trust, Privacy and Security in …, 2021 | 17 | 2021 |
Methods and apparatus to enable runtime checksum verification of block device images J Shah, S Wei, A Azab, X Chen, P Ning, W Shen, M Grace US Patent 9,984,255, 2018 | 15 | 2018 |
No time to demodulate-fast physical layer verification of friendly jamming W Shen, Y Liu, X He, H Dai, P Ning MILCOM 2015-2015 IEEE Military Communications Conference, 653-658, 2015 | 11 | 2015 |
Arm pointer authentication based forward-edge and backward-edge control flow integrity for kernels Y Yang, S Zhu, W Shen, Y Zhou, J Sun, K Ren arXiv preprint arXiv:1912.10666, 2019 | 10 | 2019 |