Analyzing Control-flow-based Glitching Attacks and DefensesChad SpenskyAravind MacHiryet al.2021DSN 2021
Scarecrow: Deactivating Evasive Malware via Its Own Evasive LogicJialong ZhangZhongshu Guet al.2020DSN 2020
Reaching Data Confidentiality and Model Accountability on the CalTrainZhongshu GuHani Jamjoomet al.2019DSN 2019
Protecting intellectual property of deep neural networks with watermarkingJialong ZhangZhongshu Guet al.2018ASIACCS 2018
Understanding the Privacy Implications of DNSSEC Look-Aside ValidationAziz MohaisenZhongshu Guet al.2017PAC 2017
ContainerLeaks: Emerging Security Threats of Information Leakages in Container CloudsXing GaoZhongshu Guet al.2017DSN 2017
GEMINI: Guest-transparent honey files via hypervisor-level access redirectionZhongshu GuBrendan Saltaformaggioet al.2018Computers and Security