Xiaoguang Wang

Education

Xi'an Jiaotong University
China

Dr.

Publications

sMVX: Multi-Variant Execution on Selected Code Paths

Summary

conference-paper

Dapper: A Lightweight and Extensible Framework for Live Program State Rewriting

Published by

2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)

Summary

conference-paper

DynaCut

Summary

conference-paper

Understanding the Security of Linux eBPF Subsystem

Summary

conference-paper

Rave: A Modular and Extensible Framework for Program State Re-Randomization

Published by

Proceedings of the 9th ACM Workshop on Moving Target Defense

Summary

conference-paper

A Framework for Software Diversification with ISA Heterogeneity

Published by

23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)

Summary

conference-paper

Secure and efficient in-process monitor (and library) protection with Intel MPK

Published by

Proceedings of the 13th European workshop on Systems Security

Summary

conference-paper

Dynamic and Secure Memory Transformation in Userspace

Published by

Computer Security -- ESORICS 2020

Summary

conference-paper

Design and implementation of SecPod, A framework for virtualization-based security systems

Published by

IEEE Transactions on Dependable and Secure Computing

Summary

journal-article

Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems

Published by

IEEE Transactions on Dependable and Secure Computing

Summary

journal-article

Enhancing Data Secrecy with Segmentation Based Isolation

Published by

Proceedings - 13th Web Information Systems and Applications Conference, WISA 2016 - In conjunction with 1st Symposium on Big Data Processing and Analysis, BDPA 2016 and 1st Workshop on Information System Security, ISS 2016

Summary

conference-paper

SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack

Published by

Proceedings - International Computer Software and Applications Conference

Summary

conference-paper

Secure the commodity applications against address exposure attacks

Published by

Proceedings - IEEE Symposium on Computers and Communications

Summary

conference-paper

Appsec: A safe execution environment for security sensitive applicationst

Published by

ACM SIGPLAN Notices

Summary

journal-article

SecPod: A Framework for Virtualization-based Security Systems

Published by

2015 USENIX Annual Technical Conference, USENIX ATC '15, July 8-10, Santa Clara, CA, USA

Summary

conference-paper

Transparent privacy protection based on virtual machine monitor

Published by

Ruan Jian Xue Bao/Journal of Software

Summary

journal-article

ARMlock: Hardware-based fault isolation for ARM

Published by

Proceedings of the ACM Conference on Computer and Communications Security

Summary

conference-paper

Protecting outsourced data privacy with lifelong policy carrying

Published by

Proceedings - 2013 IEEE International Conference on High Performance Computing and Communications, HPCC 2013 and 2013 IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2013

Summary

conference-paper

TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud

Published by

JCP

Summary

journal-article

TrustOSV: Building Trustworthy Executing Environment with Commodity Hardware for a Safe Cloud

Published by

JCP

Summary

journal-article

A lightweight VMM on many core for high performance computing

Published by

ACM SIGPLAN Notices

Summary

journal-article

A lightweight VMM on many core for high performance computing

Published by

VEE 2013 - Proceedings of the ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments

Summary

conference-paper

A lightweight VMM on many core for high performance computing

Published by

ACM SIGPLAN Notices

Summary

journal-article

A low overhead and reliable nested virtualization VMM for cloud computing

Published by

Proceedings - 2013 10th Web Information System and Application Conference, WISA 2013

Summary

conference-paper

Transparent security-sensitive process protection via vmm-based process shadowing

Published by

Proceedings - International Computer Software and Applications Conference

Summary

conference-paper

Isolate secure executing environment for a safe cloud

Published by

2012 1st IEEE International Conference on Communications in China, ICCC 2012

Summary

conference-paper