


default search action
Zhongshu Gu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Pau-Chen Cheng
, Wojciech Ozga
, Enriquillo Valdez
, Salman Ahmed
, Zhongshu Gu
, Hani Jamjoom
, Hubertus Franke
, James Bottomley
:
Intel TDX Demystified: A Top-Down Approach. ACM Comput. Surv. 56(9): 238:1-238:33 (2024) - [c24]Enriquillo Valdez
, Salman Ahmed
, Zhongshu Gu
, Christophe de Dinechin
, Pau-Chen Cheng
, Hani Jamjoom
:
Crossing Shifted Moats: Replacing Old Bridges with New Tunnels to Confidential Containers. CCS 2024: 1390-1404 - [c23]Pau-Chen Cheng
, Kevin Eykholt
, Zhongshu Gu
, Hani Jamjoom
, K. R. Jayaram
, Enriquillo Valdez
, Ashish Verma
:
DeTA: Minimizing Data Leaks in Federated Learning via Decentralized and Trustworthy Aggregation. EuroSys 2024: 219-235 - [c22]Qiushi Wu, Zhongshu Gu, Hani Jamjoom, Kangjie Lu:
GNNIC: Finding Long-Lost Sibling Functions with Abstract Similarity. NDSS 2024 - [c21]Zicheng Wang, Yicheng Guang, Yueqi Chen, Zhenpeng Lin, Michael V. Le, Dang K. Le, Dan Williams, Xinyu Xing, Zhongshu Gu, Hani Jamjoom:
SeaK: Rethinking the Design of a Secure Allocator for OS Kernel. USENIX Security Symposium 2024 - 2023
- [i4]Pau-Chen Cheng, Wojciech Ozga, Enriquillo Valdez, Salman Ahmed, Zhongshu Gu, Hani Jamjoom, Hubertus Franke, James Bottomley:
Intel TDX Demystified: A Top-Down Approach. CoRR abs/2303.15540 (2023) - 2021
- [j3]Xing Gao
, Benjamin Steenkamer
, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang
:
A Study on the Security Implications of Information Leakages in Container Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 174-191 (2021) - [c20]Chad Spensky, Aravind Machiry, Nathan Burow, Hamed Okhravi, Rick Housley, Zhongshu Gu, Hani Jamjoom, Christopher Kruegel, Giovanni Vigna:
Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses. DSN 2021: 400-412 - [c19]Pau-Chen Cheng, Kevin Eykholt
, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma:
Separation of Powers in Federated Learning (Poster Paper). ResilientFL 2021: 16-18 - [i3]Pau-Chen Cheng, Kevin Eykholt, Zhongshu Gu, Hani Jamjoom, K. R. Jayaram, Enriquillo Valdez, Ashish Verma:
Separation of Powers in Federated Learning. CoRR abs/2105.09400 (2021) - 2020
- [j2]Aziz Mohaisen
, Zhongshu Gu
, Kui Ren, Zhenhua Li
, Charles A. Kamhoua, Laurent L. Njilla, DaeHun Nyang
:
Look-Aside at Your Own Risk: Privacy Implications of DNSSEC Look-Aside Validation. IEEE Trans. Dependable Secur. Comput. 17(4): 745-759 (2020) - [c18]Jialong Zhang, Zhongshu Gu, Jiyong Jang, Dhilung Kirat, Marc Ph. Stoecklin, Xiaokui Shu, Heqing Huang:
Scarecrow: Deactivating Evasive Malware via Its Own Evasive Logic. DSN 2020: 76-87
2010 – 2019
- 2019
- [c17]Xing Gao, Zhongshu Gu, Zhengfa Li, Hani Jamjoom, Cong Wang:
Houdini's Escape: Breaking the Resource Rein of Linux Control Groups. CCS 2019: 1073-1086 - [c16]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma
, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. DSN 2019: 336-348 - 2018
- [j1]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
Gemini: Guest-transparent honey files via hypervisor-level access redirection. Comput. Secur. 77: 737-744 (2018) - [c15]Jialong Zhang, Zhongshu Gu, Jiyong Jang, Hui Wu, Marc Ph. Stoecklin, Heqing Huang, Ian M. Molloy:
Protecting Intellectual Property of Deep Neural Networks with Watermarking. AsiaCCS 2018: 159-172 - [c14]Chung Hwan Kim, Taegyu Kim, Hongjun Choi, Zhongshu Gu, Byoungyoung Lee, Xiangyu Zhang, Dongyan Xu:
Securing Real-Time Microcontroller Systems through Customized Memory View Switching. NDSS 2018 - [c13]Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger:
Security Namespace: Making Linux Security Frameworks Available to Containers. USENIX Security Symposium 2018: 1423-1439 - [i2]Zhongshu Gu, Heqing Huang, Jialong Zhang, Dong Su, Ankita Lamba, Dimitrios Pendarakis, Ian M. Molloy:
Securing Input Data of Deep Learning Inference Systems via Partitioned Enclave Execution. CoRR abs/1807.00969 (2018) - [i1]Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian M. Molloy:
Reaching Data Confidentiality and Model Accountability on the CalTrain. CoRR abs/1812.03230 (2018) - 2017
- [c12]Xing Gao, Zhongshu Gu, Mehmet Kayaalp, Dimitrios Pendarakis, Haining Wang:
ContainerLeaks: Emerging Security Threats of Information Leakages in Container Clouds. DSN 2017: 237-248 - [c11]Aziz Mohaisen
, Zhongshu Gu, Kui Ren:
Privacy Implications of DNSSEC Look-Aside Validation. ICDCS 2017: 2438-2443 - [c10]Aziz Mohaisen, Zhongshu Gu, Kui Ren, Laurent Njilla, Charles A. Kamhoua, DaeHun Nyang:
Understanding the Privacy Implications of DNSSEC Look-Aside Validation. PAC 2017: 208-209 - 2016
- [c9]Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang, Zhiwei Zhang, Luo Si, Xiangyu Zhang, Dongyan Xu:
HERCULE: attack story reconstruction via community discovery on correlated log graph. ACSAC 2016: 583-595 - [c8]Cheng Cheng, Zhui Deng, Zhongshu Gu, Dongyan Xu:
vMocity: Traveling VMs Across Heterogeneous Clouds. SRDS 2016: 101-110 - 2015
- [b1]Zhongshu Gu:
Securing Virtualized System via Active Protection. Purdue University, USA, 2015 - [c7]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
GUITAR: Piecing Together Android App GUIs from Memory Images. CCS 2015: 120-132 - [c6]Brendan Saltaformaggio, Rohit Bhatia, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images. CCS 2015: 146-157 - [c5]Zhongshu Gu, Kexin Pei, Qifan Wang, Luo Si, Xiangyu Zhang, Dongyan Xu:
LEAPS: Detecting Camouflaged Attacks with Statistical Learning Guided by Program Analysis. DSN 2015: 57-68 - 2014
- [c4]Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine. DSN 2014: 491-502 - [c3]Brendan Saltaformaggio, Zhongshu Gu, Xiangyu Zhang, Dongyan Xu:
DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse. USENIX Security Symposium 2014: 255-269 - 2013
- [c2]Zhongshu Gu, William N. Sumner
, Zhui Deng, Xiangyu Zhang, Dongyan Xu:
DRIP: A framework for purifying trojaned kernel drivers. DSN 2013: 1-12 - 2011
- [c1]Zhongshu Gu, Zhui Deng, Dongyan Xu, Xuxian Jiang:
Process Implanting: A New Active Introspection Framework for Virtualization. SRDS 2011: 147-156
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-21 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint