Author:
Liu Weijie,Wang Wenhao,Chen Hongbo,Wang XiaoFeng,Lu Yaosong,Chen Kai,Wang Xinyu,Shen Qintao,Chen Yi,Tang Haixu
Funder
National Natural Science Foundation of China
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Disposable identities: Solving web tracking;Journal of Information Security and Applications;2024-08
2. Duet: Combining a Trustworthy Controller with a Confidential Computing Environment;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
4. Mind Your Enclave Pointers! Detecting Privacy Leaks for SGX Apps via Sparse Taint Analysis;2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE);2023-10-09
5. SoK: A Systematic Review of TEE Usage for Developing Trusted Applications;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29