An Adversarial Attack on DNN-based Adaptive Cruise Control Systems

Yanan Guo , Christopher Dipalma , Takami Sato , Yulong Cao

1
2021
Interface-Based Side Channel Attack Against Intel SGX.

Yueqiang Cheng , Jinwen Wang , Qi Li , Yong Jiang
arXiv: Cryptography and Security

20
2018
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization

Yueqiang Cheng , Chenggang Wu , Pen Chung Yew , Yinqian Zhang
usenix security symposium 1239 -1256

1
2019
Continuous Release of Data Streams under both Centralized and Local Differential Privacy.

Yueqiang Cheng , Dong Su , Ninghui Li , Somesh Jha
arXiv: Cryptography and Security

18
2020
PCKV: Locally Differentially Private Correlated Key-Value Data Collection with Optimized Utility.

Li Xiong , Yueqiang Cheng , Ming Li , Yang Cao
usenix security symposium 967 -984

10
2020
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh.

Yueqiang Cheng , Chenggang Wu , Minghua Wang , Zhe Wang
arXiv: Cryptography and Security

9
2021
Making Information Hiding Effective Again

Yueqiang Cheng , Chenggang Wu , Pen-Chung Yew , Yinqian Zhang
IEEE Transactions on Dependable and Secure Computing ( 01) 1 -1

2021
SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgets

Yueqiang Cheng , Heng Yin , Qian Feng , Peng Li
network and distributed system security symposium

2021
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave

Yu Ding , Ran Duan , Long Li , Yueqiang Cheng
computer and communications security 2491 -2493

17
2017
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors

Binbin Chen , Xinshu Dong , Guangdong Bai , Sumeet Jauhar
annual computer security applications conference 425 -436

11
2017
SpecuSym: speculative symbolic execution for cache timing leak detection

Shengjian Guo , Yueqi Chen , Peng Li , Yueqiang Cheng
international conference on software engineering 1235 -1247

5
2020
Defending against ROP Attacks with Nearly Zero Overhead

Peng Qin , Cheng Tan , Lei Zhao , Yueqiang Cheng
2019 IEEE Global Communications Conference (GLOBECOM) 1 -6

2019
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android

Yueqiang Cheng , Ruowen Wang , Ahmed M. Azab , William Enck
computer and communications security 612 -624

32
2017
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis

Lei Zhao , Run Wang , Lina Wang , Yueqiang Cheng
computer software and applications conference 2 434 -443

1
2015
Efficient Virtualization-Based Application Protection Against Untrusted Operating System

Yueqiang Cheng , Xuhua Ding , Robert H Deng ,
computer and communications security 345 -356

15
2015
CONAN: A Practical Real-time APT Detection System with High Accuracy and Efficiency

Chunlin Xiong , Tiantian Zhu , Weihao Dong , Linqi Ruan
IEEE Transactions on Dependable and Secure Computing 1 -1

27
2020
RATScope: Recording and Reconstructing Missing RAT Semantic Behaviors for Forensic Analysis on Windows

Runqing Yang , Xutong Chen , Haitao Xu , Yueqiang Cheng
IEEE Transactions on Dependable and Secure Computing 1 -1

1
2020
Super Root: A New Stealthy Rooting Technique on ARM Devices

Zhangkai Zhang , Yueqiang Cheng , Zhoujun Li
applied cryptography and network security 344 -363

2020
DriverGuard: Virtualization-Based Fine-Grained Protection on I/O Flows

Yueqiang Cheng , Xuhua Ding , Robert H Deng ,
ACM Transactions on Information and System Security 16 ( 2) 6

10
2013