• Publications
  • Influence
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
TLDR
We report the first step toward systematic analyses of side-channel threats that SGX faces, focusing on the risks associated with its memory management. Expand
  • 171
  • 18
  • PDF
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
TLDR
In this paper, we describe a new variant of cube attacks called correlation cube attack. Expand
  • 18
  • 4
  • PDF
SEISMIC: SEcure In-lined Script Monitors for Interrupting Cryptojacks
TLDR
A method of detecting and interrupting unauthorized, browser-based cryptomining is proposed, based on semantic signature-matching. Expand
  • 34
  • 3
  • PDF
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
TLDR
We present HYPERRACE, an LLVM-based tool for instrumenting SGX enclave programs to eradicate all side-channel threats due to Hyper-Threading. Expand
  • 30
  • 3
  • PDF
Wireless Physical-Layer Identification: Modeling and Validation
TLDR
The wireless physical-layer identification (WPLI) techniques utilize the unique features of the physical waveforms of wireless signals to identify and classify authorized devices. Expand
  • 51
  • 2
  • PDF
VisDrone-SOT2018: The Vision Meets Drone Single-Object Tracking Challenge Results
TLDR
This paper summarizes the VisDrone-SOT2019 Challenge organized in conjunction with the 26-th International Conference on Computer Vision (ICCV2019) Drone Meets Drone: A Challenge workshop. Expand
  • 10
  • 2
  • PDF
Searching cubes for testing Boolean functions and its application to Trivium
TLDR
In this paper, we describe a sub-maximal degree monomial test and propose a heuristic algorithm for searching favourable cubes, for testing Boolean functions formed by stream ciphers. Expand
  • 16
  • 1
  • PDF
Fire detection based on flame color and area
  • Wenhao Wang, H. Zhou
  • Computer Science
  • IEEE International Conference on Computer Science…
  • 25 May 2012
TLDR
Contour Extraction of Flame Object is a key problem in fire recognition Based on Video Sequences applications, which has a direct impact on improving fire recognition accuracy. Expand
  • 21
  • 1
Activity coefficients of individual ions in aqueous solutions of sodium halides at 298.15 K
Abstract A method for measuring individual ionic activity coefficients is proposed and used to obtain activity coefficients of the individual ions in aqueous solutions of NaF (about 0.02–0.99 molExpand
  • 28
  • 1
An Anomaly Detection Model Based on Cloud Model and Danger Theory
TLDR
In order to solve non-real time problem in traditional intrusion detection technologies, this paper proposes an anomaly detection model based on cloud model and danger theory, and a dendritic cell algorithm based on data segmented detection. Expand
  • 5
  • 1