Yulong Zhang
Yulong Zhang
Verified email at
Cited by
Cited by
Savior: Towards bug-driven hybrid testing
Y Chen, P Li, J Xu, S Guo, R Zhou, Y Zhang, T Wei, L Lu
2020 IEEE Symposium on Security and Privacy (SP), 1580-1596, 2020
Incentive compatible moving target defense against vm-colocation attacks in clouds
Y Zhang, M Li, K Bai, M Yu, W Zang
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
Towards discovering and understanding task hijacking in android
C Ren, Y Zhang, H Xue, T Wei, P Liu
24th USENIX Security Symposium (USENIX Security 15), 945-959, 2015
Towards memory safe enclave programming with rust-sgx
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Adaptive android kernel live patching
Y Chen, Y Zhang, Z Wang, L Xia, C Bao, T Wei
26th USENIX Security Symposium (USENIX Security 17), 1253-1270, 2017
Downgrade attack on trustzone
Y Chen, Y Zhang, Z Wang, T Wei
arXiv preprint arXiv:1707.05082, 2017
Fingerprints on mobile devices: Abusing and leaking
Y Zhang, Z Chen, H Xue, T Wei
Black Hat Conference, 2015
POSTER: Rust SGX SDK: Towards memory safety in Intel SGX enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
Improving Cloud Survivability through Dependency based Virtual Machine Placement.
M Li, Y Zhang, K Bai, W Zang, M Yu, X He
SECRYPT, 321-326, 2012
Automatic hot patch generation for android kernels
Z Xu, Y Zhang, L Zheng, L Xia, C Bao, Z Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2397-2414, 2020
Improving virtualization security by splitting hypervisor into smaller components
W Pan, Y Zhang, M Yu, J Jing
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
Enpublic apps: Security threats using ios enterprise and developer certificates
M Zheng, H Xue, Y Zhang, T Wei, JCS Lui
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
Adaptive kernel live patching: An open collaborative effort to ameliorate android n-day root exploits
Y Zhang, Y Chen, C Bao, L Xia, L Zhen, Y Lu, T Wei, X Baidu
Proceedings of Black Hat USA, 2016
Sidewinder: Targeted attack against Android in the golden age of ad libraries
T Wei, Y Zhang, H Xue, M Zheng, C Ren, D Song
Black Hat 14, 2014
Accurate and efficient exploit capture and classification.
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
Sci. China Inf. Sci. 60 (5), 052110:1-052110:17, 2017
Quantitative survivability evaluation of three virtual machine-based server architectures
Y Yang, Y Zhang, AH Wang, M Yu, W Zang, P Liu, S Jajodia
Journal of network and computer applications 36 (2), 781-790, 2013
Hypebios: enforcing vm isolation with minimized and decomposed cloud tcb
Y Zhang, W Pan, Q Wang, K Bai, M Yu
Virginia Commonwealth University, Technical report, 2012
SSL Vulnerabilities: Who Listens When Android Applications Talk
A Mettler, Y Zhang, V Raman
Milpitas, CA, USA, Oct, 2014
To swipe or not to swipe: A challenge for your fingers
Y Zhang, T Wei
RSA Conference, USA, 2015
Diode characteristic of electrolyte-oxide-semiconductor structure for potential chemical and biological applications
YL Zhang, GC Sun, WG Wu
2011 16th International Solid-State Sensors, Actuators and Microsystems …, 2011
The system can't perform the operation now. Try again later.
Articles 1–20