Follow
Jidong Xiao
Title
Cited by
Cited by
Year
Security implications of memory deduplication in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
962013
A covert channel construction in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
422012
Kernel data attack is a realistic security threat
J Xiao, H Huang, H Wang
Security and Privacy in Communication Networks: 11th EAI International …, 2015
292015
Contextualizing consensus protocols in blockchain: A short survey
G Bashar, G Hill, S Singha, P Marella, GG Dagher, J Xiao
2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019
222019
KShot: Live kernel patching with SMM and SGX
L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
202020
HyperLink: Virtual machine introspection and memory forensic analysis without kernel source code
J Xiao, L Lu, H Wang, X Zhu
2016 IEEE international conference on autonomic computing (ICAC), 127-136, 2016
202016
Nighthawk: Transparent system introspection from ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
172019
A coprocessor-based introspection framework via intel management engine
L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021
112021
Understanding the manipulation on recommender systems through web injection
Y Zhang, J Xiao, S Hao, H Wang, S Zhu, S Jajodia
IEEE Transactions on Information Forensics and Security 15, 3807-3818, 2019
92019
Understanding the security implication of aborting virtual machine live migration
X Gao, J Xiao, H Wang, A Stavrou
IEEE Transactions on Cloud Computing 10 (2), 1275-1286, 2020
82020
Cloudskulk: A nested virtual machine based rootkit and its detection
J Connelly, T Roberts, X Gao, J Xiao, H Wang, A Stavrou
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
62021
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment
D Le, J Xiao, H Huang, H Wang
10th International Conference on Network and Service Management (CNSM) and …, 2014
62014
Hyperprobe: Towards virtual machine extrospection
J Xiao, L Lu, H Huang, H Wang
29th Large Installation System Administration Conference (LISA15), 1-12, 2015
52015
COMS: customer oriented migration service
K Huang, X Gao, F Zhang, J Xiao
2017 IEEE 10th international conference on cloud computing (CLOUD), 692-695, 2017
42017
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds
J Xiao, L Lu, H Huang, H Wang
IEEE Transactions on Cloud Computing 9 (1), 401-413, 2018
22018
A study of the multiple sign-in feature in web applications
M Albahar, X Gao, G Dagher, D Liu, F Zhang, J Xiao
Security and Privacy in Communication Networks: 15th EAI International …, 2019
12019
Exploiting CPU Clock Modulation for Covert Communication Channel
S Alam, J Xiao, NU Eisty
arXiv preprint arXiv:2404.05823, 2024
2024
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability
Z Chen, D Liu, J Xiao, H Wang
Proceedings of the 26th International Symposium on Research in Attacks …, 2023
2023
Hardware-assisted Live Kernel Function Updating on Intel Platforms
L Zhou, F Zhang, K Leach, X Ding, Z Ning, G Wang, J Xiao
IEEE Transactions on Dependable and Secure Computing, 2023
2023
CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution
S Alam, L Guan, Z Chen, H Wang, J Xiao
2023 IEEE 43rd International Conference on Distributed Computing Systems …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20