Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 447 | 2017 |
Enabling rack-scale confidential computing using heterogeneous trusted execution environment J Zhu, R Hou, XF Wang, W Wang, J Cao, B Zhao, Z Wang, Y Zhang, ... 2020 IEEE Symposium on Security and Privacy (SP), 1450-1465, 2020 | 101* | 2020 |
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin 2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018 | 96 | 2018 |
Bluethunder: A 2-level directional predictor based side-channel attack against sgx T Huo, X Meng, W Wang, C Hao, P Zhao, J Zhai, M Li IACR Transactions on Cryptographic Hardware and Embedded Systems, 321-347, 2020 | 63 | 2020 |
Randomized last-level caches are still vulnerable to cache side-channel attacks! but we can fix it W Song, B Li, Z Xue, Z Li, W Wang, P Liu 2021 IEEE Symposium on Security and Privacy (SP), 955-969, 2021 | 57 | 2021 |
A community effort to protect genomic data sharing, collaboration and outsourcing S Wang, X Jiang, H Tang, X Wang, D Bu, K Carey, SOM Dyke, D Fox, ... NPJ genomic medicine 2 (1), 33, 2017 | 47 | 2017 |
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery M Liu, J Yang, W Wang, D Lin 37th Annual International Conference on the Theory and Applications of …, 2018 | 36 | 2018 |
System for decentralized ownership and secure sharing of personalized health data S Wang, X Wang, H Tang, W Wang, A Farahanchi, H Zheng US Patent 11,003,791, 2021 | 33 | 2021 |
Toward scalable fully homomorphic encryption through light trusted computing assistance W Wang, Y Jiang, Q Shen, W Huang, H Chen, S Wang, XF Wang, H Tang, ... arXiv preprint arXiv:1905.07766, 2019 | 33 | 2019 |
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh Z Zhang, Y Cheng, M Wang, W He, W Wang, N Surya, Y Gao, K Li, ... 2022 USENIX Annual Technical Conference, 2022 | 32 | 2022 |
Searching cubes for testing Boolean functions and its application to Trivium M Liu, D Lin, W Wang 2015 IEEE International Symposium on Information Theory (ISIT), 496-500, 2015 | 20 | 2015 |
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses Z Zhang, W He, Y Cheng, W Wang, Y Gao, D Liu, K Li, S Nepal, A Fu, ... IEEE Transactions on Dependable and Secure Computing 20 (5), 3716-3733, 2022 | 18 | 2022 |
Binary code retrofitting and hardening using SGX S Wang, W Wang, Q Bao, P Wang, XF Wang, D Wu Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software …, 2017 | 18 | 2017 |
HyperEnclave: An Open and Cross-platform Trusted Execution Environment Y Jia, S Liu, W Wang, Y Chen, Z Zhai, S Yan, Z He 2022 USENIX Annual Technical Conference, 2022 | 17 | 2022 |
iDASH secure genome analysis competition 2017 XF Wang, H Tang, S Wang, X Jiang, W Wang, D Bu, L Wang, Y Jiang, ... BMC medical genomics 11, 1-2, 2018 | 17 | 2018 |
Practical and efficient in-enclave verification of privacy compliance W Liu, W Wang, H Chen, XF Wang, Y Lu, K Chen, X Wang, Q Shen, ... 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021 | 11 | 2021 |
Whistleblower: A system-level empirical study on rowhammer W He, Z Zhang, Y Cheng, W Wang, W Song, Y Gao, Q Zhang, K Li, D Liu, ... IEEE Transactions on Computers, 2023 | 10 | 2023 |
Understanding TEE containers, easy to use? Hard to trust W Liu, H Chen, XF Wang, Z Li, D Zhang, W Wang, H Tang arXiv preprint arXiv:2109.01923, 2021 | 8 | 2021 |
Trust beyond border: lightweight, verifiable user isolation for protecting in-enclave services W Wang, W Liu, H Chen, XF Wang, H Tian, D Lin IEEE transactions on dependable and secure computing 20 (1), 522-538, 2021 | 7 | 2021 |
BitMine: An end-to-end tool for detecting rowhammer vulnerability Z Zhang, W He, Y Cheng, W Wang, Y Gao, M Wang, K Li, S Nepal, ... IEEE Transactions on Information Forensics and Security 16, 5167-5181, 2021 | 7 | 2021 |