Le Guan
Le Guan
Department of Computer Science at the University of Georgia
在 cs.uga.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
982015
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
932017
Copker: Computing with Private Keys without RAM.
L Guan, J Lin, B Luo, J Jing
NDSS, 23-26, 2014
552014
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1133-1150, 2019
532019
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang
28th {USENIX} Security Symposium ({USENIX} Security 19), 1133-1150, 2019
522019
From physical to cyber: Escalating protection for personalized auto insurance
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
162016
Systematic assessment of cyber-physical security of energy management system for connected and automated electric vehicles
L Guo, B Yang, J Ye, H Chen, F Li, W Song, L Du, L Guan
IEEE Transactions on Industrial Informatics 17 (5), 3335-3347, 2020
122020
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for arm
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
102018
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
102017
Method and system for protecting root CA certificate in a virtualization environment
LIN Jingqiang, J Jing, G Le, B Li, J Wang, W Pan, Y Wang
US Patent 9,819,496, 2017
102017
VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles
P Guo, H Kim, L Guan, M Zhu, P Liu
International Conference on Security and Privacy in Communication Systems …, 2017
102017
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat mirai on iot devices
C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang
arXiv preprint arXiv:1706.05779, 2017
102017
Copker: a cryptographic engine against cold-boot attacks
L Guan, J Lin, Z Ma, B Luo, L Xia, J Jing
IEEE Transactions on Dependable and Secure Computing 15 (5), 742-754, 2016
92016
CryptMe: Data leakage prevention for unmodified programs on arm devices
C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2018
82018
Cyber–Physical Security of Powertrain Systems in Modern Electric Vehicles: Vulnerabilities, Challenges, and Future Visions
J Ye, L Guo, B Yang, F Li, L Du, L Guan, W Song
IEEE Journal of Emerging and Selected Topics in Power Electronics 9 (4 …, 2020
72020
Multi-core processor based key protection method and system
LIN Jingqiang, G Le, J Wang, W Qiongxiao, J Jing, B Li
US Patent 9,898,624, 2018
72018
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Annual Computer Security Applications Conference, 746-759, 2020
52020
Implementing a Covert Timing Channel Based on Mimic Function
J Wang, L Guan, L Liu, D Zha
International Conference on Information Security Practice and Experience …, 2014
52014
Protecting mobile devices from physical memory attacks with targeted encryption
L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia, B Luo
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
42019
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference
W Zhou, L Guan, P Liu, Y Zhang
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20