Fengwei Zhang
Fengwei Zhang
Associate Professor, Southern University of Science and Technology
Verified email at - Homepage
Cited by
Cited by
Hypercheck: A hardware-assistedintegrity monitor
F Zhang, J Wang, K Sun, A Stavrou
IEEE Transactions on Dependable and Secure Computing 11 (4), 332-344, 2014
A comparison study of intel SGX and AMD memory encryption technology
S Mofrad, F Zhang, S Lu, W Shi
Proceedings of the 7th International Workshop on Hardware and Architectural …, 2018
Using hardware features for increased debugging transparency
F Zhang, K Leach, A Stavrou, H Wang, K Sun
2015 IEEE Symposium on Security and Privacy, 55-69, 2015
Spectre: A dependable introspection framework via system management mode
F Zhang, K Leach, K Sun, A Stavrou
2013 43rd Annual IEEE/IFIP international conference on dependable systems …, 2013
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes
K Sun, J Wang, F Zhang, A Stavrou
A framework to secure peripherals at runtime
F Zhang, H Wang, K Leach, A Stavrou
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
Ninja: Towards Transparent Tracing and Debugging on ARM.
Z Ning, F Zhang
USENIX Security symposium, 33-49, 2017
Firmware-assisted Memory Acquisition and Analysis Tools for Digital Forensics
J Wang, F Zhang, K Sun, A Stavrou
SoK: A study of using hardware-assisted isolated execution environments for security
F Zhang, H Zhang
Proceedings of the Hardware and Architectural Support for Security and …, 2016
MobiPluto: File System Friendly Deniable Storage for Mobile Devices
B Chang, Z Wang, B Chen, F Zhang
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Position paper: Challenges towards securing hardware-assisted execution environments
Z Ning, F Zhang, W Shi, W Shi
Proceedings of the Hardware and Architectural Support for Security and …, 2017
Understanding the security of arm debugging features
Z Ning, F Zhang
2019 IEEE Symposium on Security and Privacy (SP), 602-619, 2019
Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels
J Li, X Tong, F Zhang, J Ma
IEEE Transactions on Information Forensics and Security 13 (6), 1535-1550, 2018
Metrics for information security vulnerabilities
JA Wang, M Xia, F Zhang
Journal of Applied Global Research 1 (1), 48-58, 2008
Temporal metrics for software vulnerabilities
JA Wang, F Zhang, M Xia
Proceedings of the 4th annual workshop on Cyber security and information …, 2008
RansomSpector: An introspection-based approach to detect crypto ransomware
F Tang, B Ma, J Li, F Zhang, J Su, J Ma
Computers & Security 97, 101997, 2020
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms
Z Ning, J Liao, F Zhang, W Shi
2018 IEEE/ACM Symposium on Edge Computing (SEC), 421-426, 2018
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
Breaking BLE beacons for fun but mostly profit
C Kolias, L Copi, F Zhang, A Stavrou
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
TrustLogin: Securing Password-Login on Commodity Operating Systems
F Zhang, K Leach, H Wang, A Stavrou
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20