default search action
Zhi Wang 0004
Person information
- affiliation: Florida State University, Tallahassee, FL, USA
- affiliation (former): North Carolina State University, NC, USA
Other persons with the same name
- Zhi Wang — disambiguation page
- Zhi Wang 0001 — Tsinghua University, Graduate School, Shenzhen, China
- Zhi Wang 0002 — Xi'an Jiaotong University, School of Software Engineering, China
- Zhi Wang 0003 — Zhejiang University, State Key Laboratory of Industrial Control Technology, Hangzhou, China
- Zhi Wang 0005 — LIP6, Sorbonne University, Paris, France
- Zhi Wang 0006 — Shanghai Jiaotong University School of Medicine, Shanghai, China
- Zhi Wang 0008 — Nanyang Technological University, Singapore
- Zhi Wang 0009 — Northeastern University, Shenyang, China
- Zhi Wang 0010 — Beijing University of Posts and Telecommunications, Beijing, China
- Zhi Wang 0011 — Dalian University of Technology, China
- Zhi Wang 0012 — Jiangsu University of Science of Technology, Zhenjiang, China
- Zhi Wang 0013 — University of Wisconsin-Madison, WI, USA (and 2 more)
- Zhi Wang 0014 — Nankai University, Tianjin, China (and 1 more)
- Zhi Wang 0015 — Southwest University, School of Mathematics and Statistics, Chongqing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. IEEE Trans. Dependable Secur. Comput. 20(2): 1609-1623 (2023) - 2022
- [j6]Siwei Wu, Lei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
Time-travel Investigation: Toward Building a Scalable Attack Detection Framework on Ethereum. ACM Trans. Softw. Eng. Methodol. 31(3): 54:1-54:33 (2022) - [c41]Yi He, Zhenhua Zou, Kun Sun, Zhuotao Liu, Ke Xu, Qian Wang, Chao Shen, Zhi Wang, Qi Li:
RapidPatch: Firmware Hotpatching for Real-Time Embedded Devices. USENIX Security Symposium 2022: 2225-2242 - [c40]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
SGXLock: Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. USENIX Security Symposium 2022: 4129-4146 - [i10]Yi He, Yacong Gu, Purui Su, Kun Sun, Yajin Zhou, Zhi Wang, Qi Li:
A Systematic Study of Android Non-SDK (Hidden) Service API Security. CoRR abs/2203.09374 (2022) - [i9]Jiawei Xu, Wenxuan Fu, Haoyu Bu, Zhi Wang, Lingyun Ying:
SeqNet: An Efficient Neural Network for Automatic Malware Detection. CoRR abs/2205.03850 (2022) - 2021
- [j5]Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, Jie Yang:
EarDynamic: An Ear Canal Deformation Based Continuous User Authentication Using In-Ear Wearables. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 39:1-39:27 (2021) - [j4]Yueqiang Cheng, Zhi Zhang, Surya Nepal, Zhi Wang:
CATTmew: Defeating Software-Only Physical Kernel Isolation. IEEE Trans. Dependable Secur. Comput. 18(4): 1989-2004 (2021) - [c39]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CCS 2021: 734-748 - [c38]Mohsen Gavahi, Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Zhi Wang, Xin Yuan:
Encrypted All-reduce on Multi-core Clusters. IPCCC 2021: 1-7 - [c37]Mehran Sadeghi Lahijani, Abu Naser, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan:
Efficient Algorithms for Encrypted All-gather Operation. IPDPS 2021: 372-381 - [c36]Zi Wang, Sheng Tan, Linghan Zhang, Yili Ren, Zhi Wang, Jie Yang:
An ear canal deformation based continuous user authentication using earables. MobiCom 2021: 819-821 - [c35]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44 - [i8]Muhui Jiang, Lin Ma, Yajin Zhou, Qiang Liu, Cen Zhang, Zhi Wang, Xiapu Luo, Lei Wu, Kui Ren:
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels. CoRR abs/2105.14295 (2021) - 2020
- [j3]Yili Ren, Sheng Tan, Linghan Zhang, Zi Wang, Zhi Wang, Jie Yang:
Liquid Level Sensing Using Commodity WiFi in a Smart Home Environment. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(1): 24:1-24:30 (2020) - [c34]Linghan Zhang, Sheng Tan, Zi Wang, Yili Ren, Zhi Wang, Jie Yang:
VibLive: A Continuous Liveness Detection for Secure Voice User Interface in IoT Environment. ACSAC 2020: 884-896 - [c33]Xiantao Zhang, Xiao Zheng, Zhi Wang, Hang Yang, Yibin Shen, Xin Long:
High-density Multi-tenant Bare-metal Cloud. ASPLOS 2020: 483-495 - [c32]Mustakimur Rahman Khandaker, Yueqiang Cheng, Zhi Wang, Tao Wei:
COIN Attacks: On Insecurity of Enclave Untrusted Interfaces in SGX. ASPLOS 2020: 971-985 - [c31]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. MICRO 2020: 28-41 - [c30]Zhengzi Xu, Yulong Zhang, Longri Zheng, Liangzhao Xia, Chenfu Bao, Zhi Wang, Yang Liu:
Automatic Hot Patch Generation for Android Kernels. USENIX Security Symposium 2020: 2397-2414 - [i7]Lei Wu, Siwei Wu, Yajin Zhou, Runhuai Li, Zhi Wang, Xiapu Luo, Cong Wang, Kui Ren:
EthScope: A Transaction-centric Security Analytics Framework to Detect Malicious Smart Contracts on Ethereum. CoRR abs/2005.08278 (2020) - [i6]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang, Yuval Yarom:
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses. CoRR abs/2007.08707 (2020) - [i5]Abu Naser, Mehran Sadeghi Lahijani, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan:
Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications. CoRR abs/2010.06139 (2020) - [i4]Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, Xin Yuan:
CryptMPI: A Fast Encrypted MPI Library. CoRR abs/2010.06471 (2020) - [i3]Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren:
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX. CoRR abs/2010.12400 (2020) - [i2]Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren:
Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020)
2010 – 2019
- 2019
- [j2]Xiaoguang Wang, Yong Qi, Zhi Wang, Yue Chen, Yajin Zhou:
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems. IEEE Trans. Dependable Secur. Comput. 16(1): 44-57 (2019) - [c29]Xiantao Zhang, Xiao Zheng, Zhi Wang, Qi Li, Junkang Fu, Yang Zhang, Yibin Shen:
Fast and Scalable VMM Live Upgrade in Large Cloud Infrastructure. ASPLOS 2019: 93-105 - [c28]Abu Naser, Mohsen Gavahi, Cong Wu, Viet Tung Hoang, Zhi Wang, Xin Yuan:
An Empirical Study of Cryptographic Libraries for MPI Communications. CLUSTER 2019: 1-11 - [c27]Mustakimur Khandaker, Abu Naser, Wenqing Liu, Zhi Wang, Yajin Zhou, Yueqiang Cheng:
Adaptive Call-Site Sensitive Control Flow Integrity. EuroS&P 2019: 95-110 - [c26]Mustakimur Khandaker, Wenqing Liu, Abu Naser, Zhi Wang, Jie Yang:
Origin-sensitive Control Flow Integrity. USENIX Security Symposium 2019: 195-211 - [i1]Zhi Zhang, Yueqiang Cheng, Dongxi Liu, Surya Nepal, Zhi Wang:
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique. CoRR abs/1912.03076 (2019) - 2018
- [c25]Yaohui Chen, Yuping Li, Long Lu, Yueh-Hsun Lin, Hayawardh Vijayakumar, Zhi Wang, Xinming Ou:
InstaGuard: Instantly Deployable Hot-patches for Vulnerable System Programs on Android. NDSS 2018 - 2017
- [c24]Yue Chen, Mustakimur Khandaker, Zhi Wang:
Pinpointing Vulnerabilities. AsiaCCS 2017: 334-345 - [c23]Yue Chen, Mustakimur Khandaker, Zhi Wang:
Secure In-Cache Execution. RAID 2017: 381-402 - [c22]Yue Chen, Yulong Zhang, Zhi Wang, Liangzhao Xia, Chenfu Bao, Tao Wei:
Adaptive Android Kernel Live Patching. USENIX Security Symposium 2017: 1253-1270 - 2016
- [c21]Yue Chen, Zhi Wang, David B. Whalley, Long Lu:
Remix: On-demand Live Randomization. CODASPY 2016: 50-61 - 2015
- [c20]Yajin Zhou, Kunal Patel, Lei Wu, Zhi Wang, Xuxian Jiang:
Hybrid User-level Sandboxing of Third-party Android Apps. AsiaCCS 2015: 19-30 - [c19]Meining Nie, Purui Su, Qi Li, Zhi Wang, Lingyun Ying, Jinlong Hu, Dengguo Feng:
Xede: Practical Exploit Early Detection. RAID 2015: 198-221 - [c18]Xiaoguang Wang, Yue Chen, Zhi Wang, Yong Qi, Yajin Zhou:
SecPod: a Framework for Virtualization-based Security Systems. USENIX ATC 2015: 347-360 - [c17]Yajin Zhou, Lei Wu, Zhi Wang, Xuxian Jiang:
Harvesting developer credentials in Android apps. WISEC 2015: 23:1-23:12 - 2014
- [c16]Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang:
ARMlock: Hardware-based Fault Isolation for ARM. CCS 2014: 558-569 - [c15]Michael Mitchell, Guanyu Tian, Zhi Wang:
Systematic audit of third-party android phones. CODASPY 2014: 175-186 - [c14]Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang:
DIVILAR: diversifying intermediate language for anti-repackaging on android platform. CODASPY 2014: 199-210 - 2013
- [c13]Chiachih Wu, Zhi Wang, Xuxian Jiang:
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution. NDSS 2013 - 2012
- [c12]Zhi Wang, Chiachih Wu, Michael C. Grace, Xuxian Jiang:
Isolating commodity hosted hypervisors with HyperLock. EuroSys 2012: 127-140 - [c11]Michael C. Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang:
Systematic Detection of Capability Leaks in Stock Android Smartphones. NDSS 2012 - [c10]Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang:
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. NDSS 2012 - 2011
- [j1]Jinku Li, Zhi Wang, Tyler K. Bletsch, Deepa Srinivasan, Michael C. Grace, Xuxian Jiang:
Comprehensive and Efficient Protection of Kernel Control Data. IEEE Trans. Inf. Forensics Secur. 6(4): 1404-1417 (2011) - [c9]Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu:
Process out-grafting: an efficient "out-of-VM" approach for fine-grained process execution monitoring. CCS 2011: 363-374 - 2010
- [c8]Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky:
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity. CCS 2010: 38-49 - [c7]Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace, Sina Bahram:
Defeating return-oriented rootkits with "Return-Less" kernels. EuroSys 2010: 195-208 - [c6]Michael C. Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhenkai Liang, Siarhei Liakh:
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization. SecureComm 2010: 162-180 - [c5]Zhi Wang, Xuxian Jiang:
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. IEEE Symposium on Security and Privacy 2010: 380-395 - [c4]Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. SRDS 2010: 82-91
2000 – 2009
- 2009
- [c3]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. CCS 2009: 545-554 - [c2]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace:
ReFormat: Automatic Reverse Engineering of Encrypted Messages. ESORICS 2009: 200-215 - 2008
- [c1]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint