Xiaoguang Wang
Xiaoguang Wang
Postdoc Associate, Virginia Tech
Verified email at vt.edu - Homepage
Title
Cited by
Cited by
Year
Armlock: Hardware-based fault isolation for arm
Y Zhou, X Wang, Y Chen, Z Wang
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
762014
Secpod: a framework for virtualization-based security systems
X Wang, Y Chen, Z Wang, Y Qi, Y Zhou
2015 {USENIX} Annual Technical Conference ({USENIX}{ATC} 15), 347-360, 2015
572015
Design and implementation of SecPod, a framework for virtualization-based security systems
X Wang, Y Qi, Z Wang, Y Chen, Y Zhou
IEEE Transactions on Dependable and Secure Computing 16 (1), 44-57, 2017
352017
Appsec: A safe execution environment for security sensitive applications
J Ren, Y Qi, Y Dai, X Wang, Y Shi
Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on …, 2015
232015
A lightweight vmm on many core for high performance computing
Y Dai, Y Qi, J Ren, Y Shi, X Wang, X Yu
Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013
152013
Protecting outsourced data privacy with lifelong policy carrying
X Wang, Q Yong, Y Dai, J Ren, Z Hang
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
72013
Secure and efficient in-process monitor (and library) protection with intel mpk
X Wang, SM Yeoh, P Olivier, B Ravindran
Proceedings of the 13th European workshop on Systems Security, 7-12, 2020
52020
TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud.
X Wang, Y Qi, Y Dai, Y Shi, J Ren, X Yu
J. Comput. 9 (10), 2303-2314, 2014
52014
A Framework for Software Diversification with {ISA} Heterogeneity
X Wang, SM Yeoh, R Lyerly, P Olivier, SH Kim, B Ravindran
23rd International Symposium on Research in Attacks, Intrusions and Defenses …, 2020
32020
Transparent privacy protection based on virtual machine monitor
JB Ren, Y Qi, YH Dai, XG WANG, Y XUAN, Y SHI
J. Softw 26 (8), 2124-2137, 2015
22015
Transparent security-sensitive process protection via vmm-based process shadowing
X Wang, Y Qi, Y Dai, J Ren
2013 IEEE 37th Annual Computer Software and Applications Conference …, 2013
22013
A Framework to Secure Applications with ISA Heterogeneity
X Wang, SM Yeoh, R Lyerly, SH Kim, B Ravindran
The 9th Workshop on Systems for Multi-core and Heterogeneous Architectures …, 2019
12019
SecretSafe: A Lightweight Approach against Heap Buffer Over-read Attack
X Wang, Y Qi, C Zhang, S Qi, P Wang
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
12017
Secure the commodity applications against address exposure attacks
X Wang, Y Qi
2017 IEEE Symposium on Computers and Communications (ISCC), 450-456, 2017
12017
基于虚拟机监控器的隐私透明保护
任建宝, 齐勇, 戴月华, 王晓光, 宣宇, 史椸
软件学报 26 (8), 2124-2137, 2015
12015
A Low Overhead and Reliable Nested Virtualization VMM for Cloud Computing
X Yu, Q Yong, Y Dai, J Ren, X Wang, S Yi
2013 10th Web Information System and Application Conference, 400-405, 2013
12013
Trochilidae: Light weight and high performance virtual machine monitor for many-core
Y Dai, Y Qi, J Ren, X Wang, Y Shi, Y Xuan
Jisuanji Kexue yu Tansuo 6 (12), 1126-1135, 2012
12012
Isolate secure executing environment for a safe cloud
Y Dai, X Wang, Y Shi, J Ren, Y Qi
2012 1st IEEE International Conference on Communications in China (ICCC), 79-84, 2012
12012
Dynamic and Secure Memory Transformation in Userspace
R Lyerly, X Wang, B Ravindran
European Symposium on Research in Computer Security, 237-256, 2020
2020
Enhancing Data Secrecy with Segmentation Based Isolation
C Zhang, H He, X Wang, Y Li, X Gao, Y Qi
2016 13th Web Information Systems and Applications Conference (WISA), 203-208, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–20