default search action
Zhenyu Ning
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Lei Zhou, Fengwei Zhang, Kevin Leach, Xuhua Ding, Zhenyu Ning, Guojun Wang, Jidong Xiao:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [j5]Chenxu Wang, Yunjie Deng, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
Building a Lightweight Trusted Execution Environment for Arm GPUs. IEEE Trans. Dependable Secur. Comput. 21(4): 3801-3816 (2024) - [j4]Tai Yue, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu, Lei Zhou:
Armor: Protecting Software Against Hardware Tracing Techniques. IEEE Trans. Inf. Forensics Secur. 19: 4247-4262 (2024) - [c21]Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi:
BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts. DSN 2024: 389-402 - [c20]Yihao Luo, Yunjie Deng, Jingquan Ge, Zhenyu Ning, Fengwei Zhang:
BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage. ESORICS (2) 2024: 85-103 - [c19]Zhenyu Ye, Lei Zhou, Fengwei Zhang, Wenqiang Jin, Zhenyu Ning, Yupeng Hu, Zheng Qin:
FortifyPatch: Towards Tamper-Resistant Live Patching in Linux-Based Hypervisor. ISSTA 2024: 38-50 - [c18]Huiling Chen, Wenqiang Jin, Yupeng Hu, Zhenyu Ning, Kenli Li, Zheng Qin, Mingxing Duan, Yong Xie, Daibo Liu, Ming Li:
Eavesdropping on Black-box Mobile Devices via Audio Amplifier's EMR. NDSS 2024 - [c17]Chenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao, Zhenyu Ning, Shoumeng Yan, Zhengyu He:
CAGE: Complementing Arm CCA with GPU Extensions. NDSS 2024 - [c16]Tai Yue, Yibo Jin, Fengwei Zhang, Zhenyu Ning, Pengfei Wang, Xu Zhou, Kai Lu:
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing. RAID 2024: 450-464 - [i3]Pai Zeng, Zhenyu Ning, Jieru Zhao, Weihao Cui, Mengwei Xu, Liwei Guo, Xusheng Chen, Yizhou Shan:
The CAP Principle for LLM Serving: A Survey of Long-Context Large Language Model Serving. CoRR abs/2405.11299 (2024) - [i2]Zhenyu Ning, Jieru Zhao, Qihao Jin, Wenchao Ding, Minyi Guo:
Inf-MLLM: Efficient Streaming Inference of Multimodal Large Language Models on a Single GPU. CoRR abs/2409.09086 (2024) - 2023
- [j3]Zhenyu Ning, Chenxu Wang, Yinhua Chen, Fengwei Zhang, Jiannong Cao:
Revisiting ARM Debugging Features: Nailgun and its Defense. IEEE Trans. Dependable Secur. Comput. 20(1): 574-589 (2023) - [c15]Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning, Xiapu Luo, Fengwei Zhang:
Alligator in Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features. ISSTA 2023: 917-928 - [c14]Yu Wang, Jinting Wu, Haodong Zheng, Zhenyu Ning, Boyuan He, Fengwei Zhang:
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V. RAID 2023: 595-608 - [c13]Yiming Zhang, Yuxin Hu, Zhenyu Ning, Fengwei Zhang, Xiapu Luo, Haoyang Huang, Shoumeng Yan, Zhengyu He:
SHELTER: Extending Arm CCA with Isolation in User Space. USENIX Security Symposium 2023: 6257-6274 - 2022
- [c12]Yunjie Deng, Chenxu Wang, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. CCS 2022: 769-783 - [c11]Yu Wang, Jinting Wu, Tai Yue, Zhenyu Ning, Fengwei Zhang:
RetTag: hardware-assisted return address integrity on RISC-V. EuroSec@EUROSYS 2022: 50-56 - 2021
- [j2]Zhenyu Ning, Fengwei Zhang:
Corrections to "Hardware-Assisted Transparent Tracing and Debugging on ARM". IEEE Trans. Inf. Forensics Secur. 16: 3479 (2021) - [c10]Haonan Li, Weijie Huang, Mingde Ren, Hongyi Lu, Zhenyu Ning, Heming Cui, Fengwei Zhang:
A Novel Memory Management for RISC-V Enclaves. HASP@MICRO 2021: 3:1-3:9 - 2020
- [c9]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13 - [c8]Yunlan Du, Zhenyu Ning, Jun Xu, Zhilong Wang, Yueh-Hsun Lin, Fengwei Zhang, Xinyu Xing, Bing Mao:
HART: Hardware-Assisted Kernel Module Tracing on Arm. ESORICS (1) 2020: 316-337
2010 – 2019
- 2019
- [j1]Zhenyu Ning, Fengwei Zhang:
Hardware-Assisted Transparent Tracing and Debugging on ARM. IEEE Trans. Inf. Forensics Secur. 14(6): 1595-1609 (2019) - [c7]Zhenyu Ning, Fengwei Zhang, Stephen M. Remias:
Understanding the Security of Traffic Signal Infrastructure. DIMVA 2019: 154-174 - [c6]Zhenyu Ning, Fengwei Zhang:
Understanding the Security of ARM Debugging Features. IEEE Symposium on Security and Privacy 2019: 602-619 - 2018
- [c5]Zhenyu Ning, Fengwei Zhang:
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. DSN 2018: 690-701 - [c4]Zhenyu Ning, Jinghui Liao, Fengwei Zhang, Weisong Shi:
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms. SEC 2018: 421-426 - [i1]Zhenyu Ning, Fengwei Zhang:
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis. CoRR abs/1803.02471 (2018) - 2017
- [c3]Zhenyu Ning, Fengwei Zhang, Weisong Shi, Weidong Shi:
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments. HASP@ISCA 2017: 6:1-6:8 - [c2]Zhenyu Ning, Fengwei Zhang:
Ninja: Towards Transparent Tracing and Debugging on ARM. USENIX Security Symposium 2017: 33-49 - 2010
- [c1]Zhenyu Ning, Yu Sun, Guofeng Qin, Qiyan Li:
An Embedded Road Crack Detection System in a Cooperative Platform. CDVE 2010: 66-72
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint