Yu Ding
Yu Ding
ByteDance
Verified email at apache.org - Homepage
Title
Cited by
Cited by
Year
VTrust: Regaining Trust on Virtual Calls
C Zhang, S Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium (NDSS'16) 2016, 2016
792016
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
512010
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
272017
Towards Memory Safe Enclave Programming with Rust-SGX
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2333 …, 2019
252019
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
152012
Android Low Entropy Demystified
Y Ding, Z Peng, Y Zhou, C Zhang
IEEE International Conference on Communications (ICC), 2014
142014
Accurate and Efficient Exploit Capture and Classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
SCIENCE CHINA Information Sciences 60 (5), 2017
72017
Poster: Classifying Downloaders
Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han
IEEE Symposium on Security and Privacy, 2015
3*2015
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
22019
Poster: AdHoneyDroid: Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
21st ACM Conference on Computer and Communications Security (Poster), 2014
22014
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
12020
SQL Injection Prevention Based on Sensitive Characters
Z Huilin, D Yu, Z Lihua, D Lei, Z Chao, W Tao, L Guancheng, H Xinhui
Journal of Computer Research and Development 53 (10), 2262, 2016
12016
Token based secure multiparty computing framework using a restricted operating environment
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent App. 16/264,512, 2020
2020
Secure multiparty computing framework using a restricted operating environment with a guest agent
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent App. 16/264,476, 2020
2020
Generic verification approach for Protobuf based projects
Q Feng, Y Zhang, P Wang, Y Ding, T Wei
US Patent 10,732,944, 2020
2020
Towards Memory Safe Python Enclave for Security Sensitive Computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
2020
Method, apparatus and system for device identification
Y Ding, T Wei, Y Zhang
US Patent 10,341,093, 2019
2019
基于分隔符的跨站脚本攻击防御方法
H Zhang, G Li, Y Ding, L Duan, X Han, J Xiao
Beijing Da Xue Xue Bao 54 (2), 320-330, 2018
2018
支付平台的安全漏洞分析
丁羽, 黎桐辛, 韦韬
收藏 1, 2017
2017
安全 hash 的攻与防
丁羽, 韦韬
计算机与网络 16, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20