Follow
Fengwei Zhang
Fengwei Zhang
Associate Professor, Southern University of Science and Technology
Verified email at sustech.edu.cn - Homepage
Title
Cited by
Cited by
Year
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014
2832014
A comparison study of intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
1162018
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
982015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
972013
Ninja: Towards Transparent Tracing and Debugging on {ARM}
Z Ning, F Zhang
26th USENIX Security Symposium (USENIX Security 17), 33-49, 2017
642017
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
K Sun, J Wang, F Zhang, A Stavrou
592012
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
552014
SoK: A study of using hardware-assisted isolated execution environments for security
F Zhang, H Zhang
Proceedings of the Hardware and Architectural Support for Security and …, 2016
542016
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics
J Wang, F Zhang, K Sun, A Stavrou
512011
Understanding the security of arm debugging features
Z Ning, F Zhang
2019 IEEE Symposium on Security and Privacy (SP), 602-619, 2019
422019
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma
Computers & Security 97, 101997, 2020
412020
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
J Li, X Tong, F Zhang, J Ma
IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018
402018
Position paper: Challenges towards securing hardware-assisted execution environments
Z Ning, F Zhang, W Shi, W Shi
Proceedings of the Hardware and Architectural Support for Security and …, 2017
402017
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
382015
Metrics for information security vulnerabilities
JA Wang, M Xia, F Zhang
Journal of Applied Global Research 1 (1), 48-58, 2008
332008
Temporal metrics for software vulnerabilities
JA Wang, F Zhang, M Xia
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
292008
Mobiceal: Towards secure and practical plausibly deniable encryption on mobile devices
B Chang, F Zhang, B Chen, Y Li, WT Zhu, Y Tian, Z Wang, A Ching
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
262018
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
Z Ning, J Liao, F Zhang, W Shi
2018 IEEE/ACM Symposium on Edge Computing (SEC), 421-426, 2018
252018
Happer: Unpacking Android Apps via a Hardware-Assisted Approach
L Xue, H Zhou, X Luo, Y Zhou, Y Shi, G Gu, F Zhang, MH Au
2021 IEEE Symposium on Security and Privacy (SP), 1641-1658, 2021
242021
Uranus: Simple, efficient sgx programming and its applications
J Jiang, X Chen, TO Li, C Wang, T Shen, S Zhao, H Cui, CL Wang, ...
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
242020
The system can't perform the operation now. Try again later.
Articles 1–20