What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xuhua Ding
Google Scholar
ORCID:
0000-0003-3974-590X
39
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone.
Yiming Zhang
Fengwei Zhang
Xiapu Luo
Rui Hou
Xuhua Ding
Zhenkai Liang
Shoumeng Yan
Tao Wei
Zhengyu He
2025
conf/asiaccs
PRISM: To Fortify Widget Based User-App Data Exchanges Using Android Virtualization Framework.
YingTat Ng
Zhe Chen
Haiqing Qiu
Xuhua Ding
2025
journals/tifs
Enhancing the Security of One-Tap Authentication Services via Dynamic Application Identification.
Di Liu
Dawei Li
Yuxiao Guo
Ying Guo
Ruinan Hu
Jianwei Liu
Song Bian
Xuhua Ding
Yizhong Liu
Zhenyu Guan
2025
conf/uss
Oblivious Digital Tokens.
Mihael Liskij
Xuhua Ding
Gene Tsudik
David A. Basin
2025
conf/uss
TETD: Trusted Execution in Trust Domains.
Zhanbo Wang
Jiaxin Zhan
Xuhua Ding
Fengwei Zhang
Ning Hu
2024
conf/asiaccs
ESem: To Harden Process Synchronization for Servers.
Zhanbo Wang
Jiaxin Zhan
Xuhua Ding
Fengwei Zhang
Ning Hu
2023
conf/ccs
KRover: A Symbolic Execution Engine for Dynamic Kernel Analysis.
Pansilu Pitigalaarachchi
Xuhua Ding
Haiqing Qiu
Haoxin Tu
Jiaqi Hong
Lingxiao Jiang
2023
conf/esorics
DScope: To Reliably and Securely Acquire Live Data from Kernel-Compromised ARM Devices.
Zhe Chen
Haiqing Qiu
Xuhua Ding
2023
conf/dsn
How to Resuscitate a Sick VM in the Cloud.
Xuhua Ding
2022
conf/sp
Smile: Secure Memory Introspection for Live Enclave.
Lei Zhou
Xuhua Ding
Fengwei Zhang
2022
conf/ndss
ScriptChecker: To Tame Third-party Script Execution With Task Capabilities.
Wu Luo
Xuhua Ding
Pengfei Wu
Xiaolei Zhang
Qingni Shen
Zhonghai Wu
2021
conf/sp
A Novel Dynamic Analysis Infrastructure to Instrument Untrusted Execution Flow Across User-Kernel Spaces.
Jiaqi Hong
Xuhua Ding
2021
conf/dsn
Catch You With Cache: Out-of-VM Introspection to Trace Malicious Executions.
Chao Su
Xuhua Ding
Qingkai Zeng
2018
conf/dsn
To Detect Stack Buffer Overflow with Polymorphic Canaries.
Zhilong Wang
Xuhua Ding
Chengbin Pang
Jian Guo
Jun Zhu
Bing Mao
2017
conf/ccs
Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Zhangkai Zhang
Xuhua Ding
Gene Tsudik
Jinhua Cui
Zhoujun Li
2017
conf/uss
Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed.
Siqi Zhao
Xuhua Ding
Wen Xu
Dawu Gu
2017
conf/eurosp
On the Effectiveness of Virtualization Based Memory Isolation on Multicore Platforms.
Siqi Zhao
Xuhua Ding
2015
conf/ccs
Efficient Virtualization-Based Application Protection Against Untrusted Operating System.
Yueqiang Cheng
Xuhua Ding
Robert H. Deng
2015
conf/esorics
On Security of Content-Based Video Stream Authentication.
Swee-Won Lo
Zhuo Wei
Robert H. Deng
Xuhua Ding
2014
journals/tifs
A Hybrid Scheme for Authenticating Scalable Video Codestreams.
Zhuo Wei
Yongdong Wu
Robert H. Deng
Xuhua Ding
2014
conf/ndss
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks.
Yueqiang Cheng
Zongwei Zhou
Miao Yu
Xuhua Ding
Robert H. Deng
2013
conf/ccs
Verifiable and private top-k monitoring.
Xuhua Ding
HweeHwa Pang
Junzuo Lai
2012
conf/ccs
STC 2012: the seventh ACM workshop on scalable trusted computing.
Xinwen Zhang
Xuhua Ding
2012
conf/ccs
Coercion resistance in authentication responsibility shifting.
Payas Gupta
Xuhua Ding
Debin Gao
2012
conf/acisp
A Generic Construction of Accountable Decryption and Its Applications.
Xuhua Zhou
Xuhua Ding
Kefei Chen
2012
conf/icics
A Generic Approach for Providing Revocation Support in Secret Handshake.
Yanjiang Yang
Haibing Lu
Jian Weng
Xuhua Ding
Jianying Zhou
2011
journals/tifs
Database Access Pattern Protection Without Full-Shuffles.
Xuhua Ding
Yanjiang Yang
Robert H. Deng
2011
conf/acns
Hierarchical Identity-Based Chameleon Hash and Its Applications.
Feng Bao
Robert H. Deng
Xuhua Ding
Junzuo Lai
Yunlei Zhao
2011
conf/esorics
DriverGuard: A Fine-Grained Protection on I/O Flows.
Yueqiang Cheng
Xuhua Ding
Robert H. Deng
2010
conf/acns
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising.
Xuhua Ding
2009
conf/ccs
Conditional proxy re-encryption secure against chosen-ciphertext attack.
Jian Weng
Robert H. Deng
Xuhua Ding
Cheng-Kang Chu
Junzuo Lai
2008
conf/ccs
Remote attestation on program execution.
Liang Gu
Xuhua Ding
Robert Huijie Deng
Bing Xie
Hong Mei
2007
conf/ccs
Protecting RFID communications in supply chains.
Yingjiu Li
Xuhua Ding
2006
conf/esorics
Private Information Retrieval Using Trusted Hardware.
Shuhong Wang
Xuhua Ding
Robert H. Deng
Feng Bao
2006
conf/acsac
Anomaly Based Web Phishing Page Detection.
Ying Pan
Xuhua Ding
2005
conf/icics
Multiplex Encryption: A Practical Approach to Encrypting Multi-recipient Emails.
Wei Wei
Xuhua Ding
Kefei Chen
2003
conf/ctrsa
Simple Identity-Based Cryptography with Mediated RSA.
Xuhua Ding
Gene Tsudik
2002
conf/ndss
Experimenting with Server-Aided Signatures.
Xuhua Ding
Daniele Mazzocchi
Gene Tsudik
2001
conf/uss
A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Dan Boneh
Xuhua Ding
Gene Tsudik
Chi-Ming Wong
Coauthors
Bing Mao
(1)
Bing Xie
(1)
Chao Su
(1)
Cheng-Kang Chu
(1)
Chengbin Pang
(1)
Chi-Ming Wong
(1)
Dan Boneh
(1)
Daniele Mazzocchi
(1)
David A. Basin
(1)
Dawei Li
(1)
Dawu Gu
(1)
Debin Gao
(1)
Di Liu
(1)
Feng Bao
(2)
Fengwei Zhang
(4)
Gene Tsudik
(5)
Haibing Lu
(1)
Haiqing Qiu
(3)
Haoxin Tu
(1)
Hong Mei
(1)
HweeHwa Pang
(1)
Jian Guo
(1)
Jian Weng
(2)
Jianwei Liu
(1)
Jianying Zhou
(1)
Jiaqi Hong
(2)
Jiaxin Zhan
(2)
Jinhua Cui
(1)
Jun Zhu
(1)
Junzuo Lai
(3)
Kefei Chen
(2)
Lei Zhou
(1)
Liang Gu
(1)
Lingxiao Jiang
(1)
Miao Yu
(1)
Mihael Liskij
(1)
Ning Hu
(2)
Pansilu Pitigalaarachchi
(1)
Payas Gupta
(1)
Pengfei Wu
(1)
Qingkai Zeng
(1)
Qingni Shen
(1)
Robert H. Deng
(9)
Robert Huijie Deng
(1)
Rui Hou
(1)
Ruinan Hu
(1)
Shoumeng Yan
(1)
Shuhong Wang
(1)
Siqi Zhao
(2)
Song Bian
(1)
Swee-Won Lo
(1)
Tao Wei
(1)
Wei Wei
(1)
Wen Xu
(1)
Wu Luo
(1)
Xiaolei Zhang
(1)
Xiapu Luo
(1)
Xinwen Zhang
(1)
Xuhua Ding
(39)
Xuhua Zhou
(1)
Yanjiang Yang
(2)
Yiming Zhang
(1)
Ying Guo
(1)
Ying Pan
(1)
Yingjiu Li
(1)
YingTat Ng
(1)
Yizhong Liu
(1)
Yongdong Wu
(1)
Yueqiang Cheng
(3)
Yunlei Zhao
(1)
Yuxiao Guo
(1)
Zhanbo Wang
(2)
Zhangkai Zhang
(1)
Zhe Chen
(2)
Zhengyu He
(1)
Zhenkai Liang
(1)
Zhenyu Guan
(1)
Zhilong Wang
(1)
Zhonghai Wu
(1)
Zhoujun Li
(1)
Zhuo Wei
(2)
Zongwei Zhou
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to