What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wenbo Shen
Google Scholar
22
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
My Model is Malware to You: Transforming AI Models into Malware by Abusing TensorFlow APIs.
Ruofan Zhu
Ganhao Chen
Wenbo Shen
Xiaofei Xie
Rui Chang
2025
conf/uss
Harness: Transparent and Lightweight Protection of Vehicle Control on Untrusted Android Automotive Operating System.
Haochen Gong
Siyu Hong
Shenyi Yang
Rui Chang
Wenbo Shen
Ziqi Yuan
Chenyang Yu
Yajin Zhou
2024
conf/ccs
CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon.
Jiaxun Zhu
Minghao Lin
Tingting Yin
Zechao Cai
Yu Wang
Rui Chang
Wenbo Shen
2024
conf/uss
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
Xingkai Wang
Wenbo Shen
Yujie Bu
Jinmeng Zhou
Yajin Zhou
2024
conf/esorics
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow.
Qirui Liu
Wenbo Shen
Jinmeng Zhou
Zhuoruo Zhang
Jiayi Hu
Shukai Ni
Kangjie Lu
Rui Chang
2023
conf/ccs
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Nanzi Yang
Wenbo Shen
Jinku Li
Xunqi Liu
Xin Guo
Jianfeng Ma
2023
conf/ccs
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Boyang Ma
Yilin Yang
Jinku Li
Fengwei Zhang
Wenbo Shen
Yajin Zhou
Jianfeng Ma
2023
conf/uss
Demystifying Pointer Authentication on Apple M1.
Zechao Cai
Jiaxun Zhu
Wenbo Shen
Yutian Yang
Rui Chang
Yu Wang
Jinku Li
Kui Ren
2023
conf/uss
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Jietao Xiao
Nanzi Yang
Wenbo Shen
Jinku Li
Xin Guo
Zhiqiang Dong
Fei Xie
Jianfeng Ma
2023
conf/uss
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Guoren Li
Hang Zhang
Jinmeng Zhou
Wenbo Shen
Yulei Sui
Zhiyun Qian
2022
conf/ccs
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API.
Xiao Han
Junjie Xiong
Wenbo Shen
Zhuo Lu
Yao Liu
2022
conf/acsac
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms.
Yutian Yang
Wenbo Shen
Xun Xie
Kangjie Lu
Mingsen Wang
Tianyu Zhou
Chenggang Qin
Wang Yu
Kui Ren
2021
conf/ccs
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Nanzi Yang
Wenbo Shen
Jinku Li
Yutian Yang
Kangjie Lu
Jietao Xiao
Tianyu Zhou
Chenggang Qin
Wang Yu
Jianfeng Ma
Kui Ren
2019
conf/ccs
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary.
Yaohui Chen
Dongliang Mu
Jun Xu
Zhichuang Sun
Wenbo Shen
Xinyu Xing
Long Lu
Bing Mao
2019
conf/uss
PeX: A Permission Check Analysis Framework for Linux Kernel.
Tong Zhang
Wenbo Shen
Dongyoon Lee
Changhee Jung
Ahmed M. Azab
Ruowen Wang
2017
conf/ccs
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Ruowen Wang
Ahmed M. Azab
William Enck
Ninghui Li
Peng Ning
Xun Chen
Wenbo Shen
Yueqiang Cheng
2017
conf/sp
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64.
Yaohui Chen
Dongli Zhang
Ruowen Wang
Rui Qiao
Ahmed M. Azab
Long Lu
Hayawardh Vijayakumar
Wenbo Shen
2016
conf/ndss
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM.
Ahmed M. Azab
Kirk Swidowski
Rohan Bhutkar
Jia Ma
Wenbo Shen
Ruowen Wang
Peng Ning
2014
conf/ccs
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World.
Ahmed M. Azab
Peng Ning
Jitesh Shah
Quan Chen
Rohan Bhutkar
Guruprasad Ganesh
Jia Ma
Wenbo Shen
2014
conf/cns
The security of link signature: A view from channel models.
Xiaofan He
Huaiyu Dai
Yufan Huang
Dong Wang
Wenbo Shen
Peng Ning
2014
conf/cns
MCR Decoding: A MIMO approach for defending against wireless jamming attacks.
Wenbo Shen
Peng Ning
Xiaofan He
Huaiyu Dai
Yao Liu
2013
conf/sp
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time.
Wenbo Shen
Peng Ning
Xiaofan He
Huaiyu Dai
Coauthors
Ahmed M. Azab
(5)
Bing Mao
(1)
Boyang Ma
(1)
Changhee Jung
(1)
Chenggang Qin
(2)
Chenyang Yu
(1)
Dong Wang
(1)
Dongli Zhang
(1)
Dongliang Mu
(1)
Dongyoon Lee
(1)
Fei Xie
(1)
Fengwei Zhang
(1)
Ganhao Chen
(1)
Guoren Li
(1)
Guruprasad Ganesh
(1)
Hang Zhang
(1)
Haochen Gong
(1)
Hayawardh Vijayakumar
(1)
Huaiyu Dai
(3)
Jia Ma
(2)
Jianfeng Ma
(4)
Jiaxun Zhu
(2)
Jiayi Hu
(1)
Jietao Xiao
(2)
Jinku Li
(5)
Jinmeng Zhou
(3)
Jitesh Shah
(1)
Jun Xu
(1)
Junjie Xiong
(1)
Kangjie Lu
(3)
Kirk Swidowski
(1)
Kui Ren
(3)
Long Lu
(2)
Minghao Lin
(1)
Mingsen Wang
(1)
Nanzi Yang
(3)
Ninghui Li
(1)
Peng Ning
(6)
Qirui Liu
(1)
Quan Chen
(1)
Rohan Bhutkar
(2)
Rui Chang
(5)
Rui Qiao
(1)
Ruofan Zhu
(1)
Ruowen Wang
(4)
Shenyi Yang
(1)
Shukai Ni
(1)
Siyu Hong
(1)
Tianyu Zhou
(2)
Tingting Yin
(1)
Tong Zhang
(1)
Wang Yu
(2)
Wenbo Shen
(22)
William Enck
(1)
Xiao Han
(1)
Xiaofan He
(3)
Xiaofei Xie
(1)
Xin Guo
(2)
Xingkai Wang
(1)
Xinyu Xing
(1)
Xun Chen
(1)
Xun Xie
(1)
Xunqi Liu
(1)
Yajin Zhou
(3)
Yao Liu
(2)
Yaohui Chen
(2)
Yilin Yang
(1)
Yu Wang
(1)
Yu Wang
(1)
Yueqiang Cheng
(1)
Yufan Huang
(1)
Yujie Bu
(1)
Yulei Sui
(1)
Yutian Yang
(3)
Zechao Cai
(2)
Zhichuang Sun
(1)
Zhiqiang Dong
(1)
Zhiyun Qian
(1)
Zhuo Lu
(1)
Zhuoruo Zhang
(1)
Ziqi Yuan
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to