default search action
Jidong Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Lei Zhou, Fengwei Zhang, Kevin Leach, Xuhua Ding, Zhenyu Ning, Guojun Wang, Jidong Xiao:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [c18]Zeyu Chen, Jidong Xiao, Angelos Stavrou, Haining Wang:
An Exploration of Fuzzing for Discovering Use-After-Free Vulnerabilities. ISSRE (Workshops) 2024: 19-24 - [c17]Shariful Alam, Jidong Xiao, Nasir U. Eisty:
Exploiting CPU Clock Modulation for Covert Communication Channel. SERA 2024: 153-158 - [i1]Shariful Alam, Jidong Xiao, Nasir U. Eisty:
Exploiting CPU Clock Modulation for Covert Communication Channel. CoRR abs/2404.05823 (2024) - 2023
- [c16]Shariful Alam, Le Guan, Zeyu Chen, Haining Wang, Jidong Xiao:
CAUSEC: Cache-Based Secure Key Computation with (Mostly) Deprivileged Execution. ICDCS 2023: 84-95 - [c15]Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang:
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. RAID 2023: 623-638 - 2022
- [j4]Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou:
Understanding the Security Implication of Aborting Virtual Machine Live Migration. IEEE Trans. Cloud Comput. 10(2): 1275-1286 (2022) - 2021
- [j3]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds. IEEE Trans. Cloud Comput. 9(1): 401-413 (2021) - [j2]Lei Zhou, Fengwei Zhang, Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding, Guojun Wang:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [c14]Joseph Connelly, Taylor Roberts, Xing Gao, Jidong Xiao, Haining Wang, Angelos Stavrou:
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection. DSN 2021: 350-362 - 2020
- [j1]Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [c13]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13
2010 – 2019
- 2019
- [c12]Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. ESORICS (2) 2019: 217-238 - [c11]Marwan Ali Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang, Jidong Xiao:
A Study of the Multiple Sign-in Feature in Web Applications. SecureComm (2) 2019: 440-453 - [c10]Golam Dastoger Bashar, Graham Hill, Subroto Singha, Praneeth Babu Marella, Gaby G. Dagher, Jidong Xiao:
Contextualizing Consensus Protocols in Blockchain: A Short Survey. TPS-ISA 2019: 190-195 - 2017
- [c9]Kai Huang, Xing Gao, Fengwei Zhang, Jidong Xiao:
COMS: Customer Oriented Migration Service. CLOUD 2017: 692-695 - 2016
- [c8]Jidong Xiao, Lei Lu, Haining Wang, Xiaoyun Zhu:
HyperLink: Virtual Machine Introspection and Memory Forensic Analysis without Kernel Source Code. ICAC 2016: 127-136 - [c7]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. USENIX ATC 2016 - 2015
- [c6]Jidong Xiao, Lei Lu, Hai Huang, Haining Wang:
Hyperprobe: Towards Virtual Machine Extrospection. LISA 2015: 1-12 - [c5]Jidong Xiao, Hai Huang, Haining Wang:
Defeating Kernel Driver Purifier. SecureComm 2015: 116-134 - [c4]Jidong Xiao, Hai Huang, Haining Wang:
Kernel Data Attack Is a Realistic Security Threat. SecureComm 2015: 135-154 - 2014
- [c3]Duy Le, Jidong Xiao, Hai Huang, Haining Wang:
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment. CNSM 2014: 169-174 - 2013
- [c2]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
Security implications of memory deduplication in a virtualized environment. DSN 2013: 1-12 - 2012
- [c1]Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
A covert channel construction in a virtualized environment. CCS 2012: 1040-1042
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint