default search action
Wenhao Wang 0001
Person information
- affiliation: Chinese Academy of Sciences, SKLOIS, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Wenhao Wang (aka: Wen-Hao Wang) — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Haopeng Fan, Hailong Zhang, Yongjuan Wang, Wenhao Wang, Yanbei Zhu, Haojin Zhang, Qingjun Yuan:
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium. IEEE Trans. Inf. Forensics Secur. 19: 7118-7132 (2024) - [c29]Zhenyang Dai, Shuang Liu, Vilhelm Sjöberg, Xupeng Li, Yu Chen, Wenhao Wang, Yuekai Jia, Sean Noble Anderson, Laila Elbeheiry, Shubham Sondhi, Yu Zhang, Zhaozhong Ni, Shoumeng Yan, Ronghui Gu, Zhengyu He:
Verifying Rust Implementation of Page Tables in a Software Enclave Hypervisor. ASPLOS (2) 2024: 1218-1232 - [c28]Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang, Zhonghai Wu:
ThermalScope: A Practical Interrupt Side Channel Attack Based on Thermal Event Interrupts. DAC 2024: 28:1-28:6 - [c27]Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang, Yansong Gao, Zhuoxi Yang, Jiliang Zhang:
SegScope: Probing Fine-grained Interrupts via Architectural Footprints. HPCA 2024: 424-438 - [c26]Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang:
Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection. USENIX Security Symposium 2024 - [i14]Wenhao Wang, Linke Song, Benshan Mei, Shuang Liu, Shijun Zhao, Shoumeng Yan, XiaoFeng Wang, Dan Meng, Rui Hou:
NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs. CoRR abs/2402.11438 (2024) - [i13]Benshan Mei, Saisai Xia, Wenhao Wang, Dongdai Lin:
Cabin: Confining Untrusted Programs within Confidential VMs. CoRR abs/2407.12334 (2024) - [i12]Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou:
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems. CoRR abs/2409.20002 (2024) - 2023
- [j7]Wenhao Wang, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, Dongdai Lin:
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services. IEEE Trans. Dependable Secur. Comput. 20(1): 522-538 (2023) - [j6]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou:
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses. IEEE Trans. Dependable Secur. Comput. 20(5): 3716-3733 (2023) - [c25]Zihao Wang, Jiale Guan, XiaoFeng Wang, Wenhao Wang, Luyi Xing, Fares Fahad S. Alharbi:
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning. CCS 2023: 281-295 - [c24]Wenwen Ruan, Wenhao Wang, Shuang Liu, Ran Duan, Shoumeng Yan:
DomainIsolation: Lightweight Intra-enclave Isolation for Confidential Virtual Machines. SciSec 2023: 23-41 - [c23]Jinze She, Wenhao Wang, Zihao Wang:
The Dynamic Paradox: How Layer-skipping DNNs Amplify Cache Side-Channel Leakages. TrustCom 2023: 46-53 - [i11]Xiangyi Xu, Wenhao Wang, Yongzheng Wu, Zhennan Min, Zixuan Pang, Yier Jin:
virtCCA: Virtualized Arm Confidential Compute Architecture with TrustZone. CoRR abs/2306.11011 (2023) - 2022
- [j5]Wenhao Wang, Guangyu Hu, Xiaolin Xu, Jiliang Zhang:
CRAlert: Hardware-Assisted Code Reuse Attack Detection. IEEE Trans. Circuits Syst. II Express Briefs 69(3): 1607-1611 (2022) - [c22]Tong Zhu, Chenyang Liao, Lanting Guo, Ziyang Zhou, Wenwen Ruan, Wenhao Wang, Xinyu Li, Qingfu Zhang, Hao Zheng, Shuang Wang, Yuetong Liu:
Detecting and Warning Abnormal Transaction of Virtual Cryptocurrency Based on Privacy Protection Framework. SmartCloud 2022: 74-82 - [c21]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. USENIX ATC 2022: 399-414 - [c20]Yuekai Jia, Shuang Liu, Wenhao Wang, Yu Chen, Zhengde Zhai, Shoumeng Yan, Zhengyu He:
HyperEnclave: An Open and Cross-platform Trusted Execution Environment. USENIX ATC 2022: 437-454 - [i10]Yuekai Jia, Shuang Liu, Wenhao Wang, Yu Chen, Zhengde Zhai, Shoumeng Yan, Zhengyu He:
HyperEnclave: An Open and Cross-platform Trusted Execution Environment. CoRR abs/2212.04197 (2022) - 2021
- [j4]Zhi Zhang, Wei He, Yueqiang Cheng, Wenhao Wang, Yansong Gao, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang:
BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability. IEEE Trans. Inf. Forensics Secur. 16: 5167-5181 (2021) - [c19]Wenhao Wang, Yukui Luo, Xiaolin Xu:
Constructive Use of Process Variations: Reconfigurable and High-Resolution Delay-Line. DATE 2021: 392-395 - [c18]Weijie Liu, Wenhao Wang, Hongbo Chen, Xiaofeng Wang, Yaosong Lu, Kai Chen, Xinyu Wang, Qintao Shen, Yi Chen, Haixu Tang:
Practical and Efficient in-Enclave Verification of Privacy Compliance. DSN 2021: 413-425 - [c17]Shijin Duan, Wenhao Wang, Yukui Luo, Xiaolin Xu:
A Survey of Recent Attacks and Mitigation on FPGA Systems. ISVLSI 2021: 284-289 - [c16]Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. SP 2021: 955-969 - [i9]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. CoRR abs/2102.10269 (2021) - [i8]Weijie Liu, Hongbo Chen, XiaoFeng Wang, Zhi Li, Danfeng Zhang, Wenhao Wang, Haixu Tang:
Understanding TEE Containers, Easy to Use? Hard to Trust. CoRR abs/2109.01923 (2021) - 2020
- [j3]Yukui Luo, Wenhao Wang, Scott Best, Yanzhi Wang, Xiaolin Xu:
A High-Performance and Secure TRNG Based on Chaotic Cellular Automata Topology. IEEE Trans. Circuits Syst. 67-I(12): 4970-4983 (2020) - [j2]Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, Mingshu Li:
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 321-347 (2020) - [c15]Yifan Gong, Zheng Zhan, Zhengang Li, Wei Niu, Xiaolong Ma, Wenhao Wang, Bin Ren, Caiwen Ding, Xue Lin, Xiaolin Xu, Yanzhi Wang:
A Privacy-Preserving-Oriented DNN Pruning and Mobile Acceleration Framework. ACM Great Lakes Symposium on VLSI 2020: 119-124 - [c14]Yaosong Lu, Weijie Liu, Wenhao Wang:
Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks. ISPA/BDCloud/SocialCom/SustainCom 2020: 363-370 - [c13]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng:
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment. SP 2020: 1450-1465 - [c12]Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li:
TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks. TrustCom 2020: 320-327 - [c11]Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang, Liheng Chen:
Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks. TrustCom 2020: 378-385 - [i7]Weijie Liu, Wenhao Wang, XiaoFeng Wang, Xiaozhu Meng, Yaosong Lu, Hongbo Chen, Xinyu Wang, Qingtao Shen, Kai Chen, Haixu Tang, Yi Chen, Luyi Xing:
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance. CoRR abs/2007.10513 (2020) - [i6]Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu:
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It. CoRR abs/2008.01957 (2020)
2010 – 2019
- 2019
- [i5]Jianping Zhu, Rui Hou, XiaoFeng Wang, Wenhao Wang, Jiangfeng Cao, Lutan Zhao, Fengkai Yuan, Peinan Li, Zhongpu Wang, Boyan Zhao, Lixin Zhang, Dan Meng:
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment. CoRR abs/1904.04782 (2019) - [i4]Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, Xiaofeng Wang, Haixu Tang, Kai Chen, Kristin E. Lauter, Dongdai Lin:
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance. CoRR abs/1905.07766 (2019) - 2018
- [c10]Zhe Zhou, Di Tang, Wenhao Wang, Xiaofeng Wang, Zhou Li, Kehuan Zhang:
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection. ACSAC 2018: 77-88 - [c9]Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. EUROCRYPT (2) 2018: 715-744 - [c8]Jingchun Yang, Meicheng Liu, Dongdai Lin, Wenhao Wang:
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK. IWSEC 2018: 244-261 - [c7]Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. IEEE Symposium on Security and Privacy 2018: 178-194 - [i3]Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin:
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. IACR Cryptol. ePrint Arch. 2018: 158 (2018) - 2017
- [c6]Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu:
Binary Code Retrofitting and Hardening Using SGX. FEAST@CCS 2017: 43-49 - [c5]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [i2]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - 2015
- [c4]Meicheng Liu, Dongdai Lin, Wenhao Wang:
Searching cubes for testing Boolean functions and its application to Trivium. ISIT 2015: 496-500 - [i1]Wenhao Wang:
Notes on Rainbow Distinguished Point Method. CoRR abs/1506.00794 (2015) - 2013
- [j1]Wenhao Wang, Meicheng Liu, Yin Zhang:
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation". Cryptogr. Commun. 5(1): 1-6 (2013) - [c3]Wenhao Wang, Dongdai Lin:
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited. ICICS 2013: 288-301 - 2012
- [c2]Zhenqi Li, Yao Lu, Wenhao Wang, Bin Zhang, Dongdai Lin:
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack. ICICS 2012: 311-320 - 2011
- [c1]Wenhao Wang, Dongdai Lin, Zhenqi Li, Tianze Wang:
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications. ICICS 2011: 282-296
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint