default search action
Chenggang Wu 0002
Person information
- affiliation: Chinese Academy of Sciences, State Key Laboratory of Computer Architecture, Huairou, Beijing, China
Other persons with the same name
- Chenggang Wu — disambiguation page
- Chenggang Wu 0001 — Aqueduct Inc., USA (and 1 more)
- Chenggang Wu 0003 — Tsinghua University, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c27]Lichen Jia, Chenggang Wu, Bowen Tang, Peihua Zhang, Zihan Jiang, Yang Yang, Ning Liu, Jingfeng Zhang, Zhe Wang:
Enhancing Learning-Based Binary Code Similarity Detection Model through Adversarial Training with Multiple Function Variants. EMNLP (Findings) 2024: 11508-11518 - [c26]Lichen Jia, Chenggang Wu, Peihua Zhang, Zhe Wang:
CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques. LCTES 2024: 143-154 - [c25]Lei Chen, Shi Liu, Chenxi Wang, Haoran Ma, Yifan Qiao, Zhe Wang, Chenggang Wu, Youyou Lu, Xiaobing Feng, Huimin Cui, Shan Lu, Harry Xu:
A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications. OSDI 2024: 77-95 - [c24]Jiming Wang, Yan Kang, Chenggang Wu, Yuhao Hu, Yue Sun, Jikai Ren, Yuanming Lai, Mengyao Xie, Charles Zhang, Tao Li, Zhe Wang:
OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers. USENIX Security Symposium 2024 - [c23]Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang:
HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64. USENIX Security Symposium 2024 - [i6]Lei Chen, Shi Liu, Chenxi Wang, Haoran Ma, Yifan Qiao, Zhe Wang, Chenggang Wu, Youyou Lu, Xiaobing Feng, Huimin Cui, Shan Lu, Harry Xu:
A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications. CoRR abs/2406.16005 (2024) - 2023
- [j11]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4477-4490 (2023) - [j10]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 827-840 (2023) - [j9]Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li:
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. IEEE Trans. Dependable Secur. Comput. 20(3): 1959-1978 (2023) - [c22]Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
PANIC: PAN-assisted Intra-process Memory Isolation on ARM. CCS 2023: 919-933 - [c21]Peihua Zhang, Chenggang Wu, Mingfan Peng, Kai Zeng, Ding Yu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang:
Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques. CGO 2023: 55-67 - [i5]Peihua Zhang, Chenggang Wu, Mingfan Peng, Kai Zeng, Ding Yu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang:
Khaos: The Impact of Inter-procedural Code Obfuscation on Binary Diffing Techniques. CoRR abs/2301.11586 (2023) - [i4]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. CoRR abs/2302.00947 (2023) - 2022
- [j8]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
Making Information Hiding Effective Again. IEEE Trans. Dependable Secur. Comput. 19(4): 2576-2594 (2022) - [c20]Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang:
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. CCS 2022: 2989-3002 - [c19]Lili Sun, Chenggang Wu, Zhe Wang, Yan Kang, Bowen Tang:
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines. COMPSAC 2022: 757-766 - [c18]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh. USENIX ATC 2022: 399-414 - [c17]Shunfan Zhou, Zhemin Yang, Dan Qiao, Peng Liu, Min Yang, Zhe Wang, Chenggang Wu:
Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security Symposium 2022: 4365-4382 - [i3]Lichen Jia, Bowen Tang, Chenggang Wu, Zhe Wang, Zihan Jiang, Yuanming Lai, Yan Kang, Ning Liu, Jingfeng Zhang:
FuncFooler: A Practical Black-box Attack Against Learning-based Binary Code Similarity Detection Methods. CoRR abs/2208.14191 (2022) - 2021
- [j7]Jifeng He, Chenggang Wu, Huawei Li, Yang Guo, Tao Li:
Editorial for the special issue on reliability and power efficiency for HPC. CCF Trans. High Perform. Comput. 3(1): 1-3 (2021) - [i2]Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu:
SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh. CoRR abs/2102.10269 (2021) - [i1]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. CoRR abs/2107.08367 (2021) - 2020
- [c16]Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang:
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. SP 2020: 592-607
2010 – 2019
- 2019
- [c15]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. USENIX Security Symposium 2019: 1239-1256 - 2018
- [j6]Zhe Wang, Chenggang Wu, Xiang Yuan, Zhenjiang Wang, Jianjun Li, Pen-Chung Yew, Jeff Huang, Xiaobing Feng, Yanyan Lan, Yunji Chen, Yuanming Lai, Yong Guan:
Using Local Clocks to Reproduce Concurrency Bugs. IEEE Trans. Software Eng. 44(11): 1112-1128 (2018) - 2017
- [c14]Mengyao Xie, Lei Liu, Hao Yang, Chenggang Wu, Hongna Geng:
SysMon: Monitoring Memory Behaviors via OS Approach. APPT 2017: 51-63 - [c13]Zhe Wang, Chenggang Wu, Jianjun Li, Yuanming Lai, Xiangyu Zhang, Wei-Chung Hsu, Yueqiang Cheng:
ReRanz: A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks. VEE 2017: 143-156 - 2016
- [c12]Lei Liu, Hao Yang, Yong Li, Mengyao Xie, Lian Li, Chenggang Wu:
Memos: A full hierarchy hybrid memory management framework. ICCD 2016: 368-371 - 2015
- [j5]Chenggang Wu, Jin Li, Di Xu, Pen-Chung Yew, Jianjun Li, Zhenjiang Wang:
FPS: A Fair-Progress Process Scheduling Policy on Shared-Memory Multiprocessors. IEEE Trans. Parallel Distributed Syst. 26(2): 444-454 (2015) - [c11]Xiang Yuan, Chenggang Wu, Zhenjiang Wang, Jianjun Li, Pen-Chung Yew, Jeff Huang, Xiaobing Feng, Yanyan Lan, Yunji Chen, Yong Guan:
ReCBuLC: Reproducing Concurrency Bugs Using Local Clocks. ICSE (1) 2015: 824-834 - [c10]Zhe Wang, Jianjun Li, Chenggang Wu, Dongyan Yang, Zhenjiang Wang, Wei-Chung Hsu, Bin Li, Yong Guan:
HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines. VEE 2015: 53-64 - 2014
- [j4]Fang Lu, Huimin Cui, Lei Wang, Lei Liu, Chenggang Wu, Xiaobing Feng, Pen-Chung Yew:
Dynamic I/O-Aware Scheduling for Batch-Mode Applications on Chip Multiprocessor Systems of Cluster Platforms. J. Comput. Sci. Technol. 29(1): 21-37 (2014) - [c9]Jianjun Li, Zhenjiang Wang, Chenggang Wu, Wei-Chung Hsu, Di Xu:
Dynamic and Adaptive Calling Context Encoding. CGO 2014: 120 - [c8]Wenwen Wang, Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew, Xipeng Shen, Xiang Yuan, Jianjun Li, Xiaobing Feng, Yong Guan:
Localization of concurrency bugs using shared memory access pairs. ASE 2014: 611-622 - [c7]Wenwen Wang, Chenggang Wu, Pen-Chung Yew, Xiang Yuan, Zhenjiang Wang, Jianjun Li, Xiaobing Feng:
Concurrency bug localization using shared memory access pairs. PPoPP 2014: 375-376 - 2013
- [c6]Xiang Yuan, Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew, Wenwen Wang, Jianjun Li, Di Xu:
Synchronization Identification through On-the-Fly Test. Euro-Par 2013: 4-15 - 2012
- [j3]Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew, Jianjun Li, Di Xu:
On-the-fly structure splitting for heap objects. ACM Trans. Archit. Code Optim. 8(4): 26:1-26:20 (2012) - [c5]Di Xu, Chenggang Wu, Pen-Chung Yew, Jianjun Li, Zhenjiang Wang:
Providing fairness on shared-memory multiprocessors via process scheduling. SIGMETRICS 2012: 295-306 - 2011
- [j2]Jianjun Li, Chenggang Wu, Wei-Chung Hsu:
Efficient and effective misaligned data access handling in a dynamic binary translation system. ACM Trans. Archit. Code Optim. 8(2): 7:1-7:29 (2011) - [c4]Jianjun Li, Chenggang Wu, Wei-Chung Hsu:
Dynamic register promotion of stack variables. CGO 2011: 21-31 - 2010
- [c3]Di Xu, Chenggang Wu, Pen-Chung Yew:
On mitigating memory bandwidth contention through bandwidth-aware scheduling. PACT 2010: 237-248 - [c2]Zhenjiang Wang, Chenggang Wu, Pen-Chung Yew:
On improving heap memory layout by dynamic pool allocation. CGO 2010: 92-100
2000 – 2009
- 2009
- [c1]Jianjun Li, Chenggang Wu, Wei-Chung Hsu:
An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems. CGO 2009: 180-189 - 2006
- [j1]Hao Yang, Feng Tang, Haibin Xie, Chenggang Wu, Xiaobing Feng:
Library Function Disposing Approach in Binary Translation. J. Comput. Res. Dev. 43(12): 2174-2179 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint