default search action
Wenbo Shen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. IEEE Trans. Dependable Secur. Comput. 21(1): 403-418 (2024) - [j8]Yutian Yang, Jinjiang Tu, Wenbo Shen, Songbo Zhu, Rui Chang, Yajin Zhou:
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS Kernels. IEEE Trans. Dependable Secur. Comput. 21(4): 3768-3784 (2024) - [j7]Xiao Han, Junjie Xiong, Wenbo Shen, Mingkui Wei, Shangqing Zhao, Zhuo Lu, Yao Liu:
The Perils of Wi-Fi Spoofing Attack Via Geolocation API and Its Defense. IEEE Trans. Dependable Secur. Comput. 21(5): 4343-4359 (2024) - [c41]Jiaxun Zhu, Minghao Lin, Tingting Yin, Zechao Cai, Yu Wang, Rui Chang, Wenbo Shen:
CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon. CCS 2024: 3749-3762 - [c40]Qirui Liu, Wenbo Shen, Jinmeng Zhou, Zhuoruo Zhang, Jiayi Hu, Shukai Ni, Kangjie Lu, Rui Chang:
Interp-flow Hijacking: Launching Non-control Data Attack via Hijacking eBPF Interpretation Flow. ESORICS (3) 2024: 194-214 - [c39]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. ICSE 2024: 24:1-24:13 - [c38]Ruofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu:
ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem. ICSE 2024: 211:1-211:12 - [c37]Hao Xiong, Qinming Dai, Rui Chang, Mingran Qiu, Renxiang Wang, Wenbo Shen, Yajin Zhou:
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries. ISSTA 2024: 350-362 - [c36]Jiongchi Yu, Xiaofei Xie, Cen Zhang, Sen Chen, Yuekang Li, Wenbo Shen:
Bugs in Pods: Understanding Bugs in Container Runtime Systems. ISSTA 2024: 1364-1376 - [c35]Xiaoyong Yan, Biao He, Wenbo Shen, Yu Ouyang, Kaihang Zhou, Xingjian Zhang, Xingyu Wang, Yukai Cao, Rui Chang:
Automated Data Binding Vulnerability Detection for Java Web Frameworks via Nested Property Graph. ISSTA 2024: 1377-1388 - [c34]Ziqi Yuan, Siyu Hong, Ruorong Guo, Rui Chang, Mingyu Gao, Wenbo Shen, Yajin Zhou:
LightZone: Lightweight Hardware-Assisted In-Process Isolation for ARM64. Middleware 2024: 467-480 - [c33]Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou:
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks. USENIX Security Symposium 2024 - [i10]Ruofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu:
ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem. CoRR abs/2401.02090 (2024) - [i9]Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren:
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines. CoRR abs/2401.17606 (2024) - [i8]Jinmeng Zhou, Jiayi Hu, Ziyue Pan, Jiaxun Zhu, Wenbo Shen, Guoren Li, Zhiyun Qian:
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems. CoRR abs/2401.17618 (2024) - 2023
- [j6]Jinmeng Zhou, Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang, Peng Ning, Kui Ren:
Automatic Permission Check Analysis for Linux Kernel. IEEE Trans. Dependable Secur. Comput. 20(3): 1849-1866 (2023) - [c32]Ziqi Yuan, Siyu Hong, Rui Chang, Yajin Zhou, Wenbo Shen, Kui Ren:
VDom: Fast and Unlimited Virtual Domains on Multiple Architectures. ASPLOS (2) 2023: 905-919 - [c31]Boyang Ma, Yilin Yang, Jinku Li, Fengwei Zhang, Wenbo Shen, Yajin Zhou, Jianfeng Ma:
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery. CCS 2023: 341-355 - [c30]Nanzi Yang, Wenbo Shen, Jinku Li, Xunqi Liu, Xin Guo, Jianfeng Ma:
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications. CCS 2023: 3048-3062 - [c29]Zechao Cai, Jiaxun Zhu, Wenbo Shen, Yutian Yang, Rui Chang, Yu Wang, Jinku Li, Kui Ren:
Demystifying Pointer Authentication on Apple M1. USENIX Security Symposium 2023: 2833-2848 - [c28]Guoren Li, Hang Zhang, Jinmeng Zhou, Wenbo Shen, Yulei Sui, Zhiyun Qian:
A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel. USENIX Security Symposium 2023: 4211-4228 - [c27]Jietao Xiao, Nanzi Yang, Wenbo Shen, Jinku Li, Xin Guo, Zhiqiang Dong, Fei Xie, Jianfeng Ma:
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding. USENIX Security Symposium 2023: 7517-7534 - [i7]Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. CoRR abs/2310.17186 (2023) - 2022
- [c26]Yutian Yang, Wenbo Shen, Xun Xie, Kangjie Lu, Mingsen Wang, Tianyu Zhou, Chenggang Qin, Wang Yu, Kui Ren:
Making Memory Account Accountable: Analyzing and Detecting Memory Missing-account bugs for Container Platforms. ACSAC 2022: 869-880 - [c25]Xiao Han, Junjie Xiong, Wenbo Shen, Zhuo Lu, Yao Liu:
Location Heartbleeding: The Rise of Wi-Fi Spoofing Attack Via Geolocation API. CCS 2022: 1383-1397 - [c24]Jinyan Xu, Haoran Lin, Ziqi Yuan, Wenbo Shen, Yajin Zhou, Rui Chang, Lei Wu, Kui Ren:
RegVault: hardware assisted selective data randomization for operating system kernels. DAC 2022: 715-720 - [c23]Xia Zhou, Jiaqi Li, Wenlong Zhang, Yajin Zhou, Wenbo Shen, Kui Ren:
OPEC: operation-based security isolation for bare-metal embedded systems. EuroSys 2022: 317-333 - [i6]Zhuoruo Zhang, Chenyang Yu, He Huang, Rui Chang, Mingshuai Chen, Qinming Dai, Wenbo Shen, Yongwang Zhao, Kui Ren:
PA-Boot: A Formally Verified Authentication Protocol for Multiprocessor Secure Boot. CoRR abs/2209.07936 (2022) - 2021
- [j5]Brian Belleville, Wenbo Shen, Stijn Volckaert, Ahmed M. Azab, Michael Franz:
KALD: Detecting Direct Pointer Disclosure Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 18(3): 1369-1377 (2021) - [c22]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting challenges for selective data protection of real applications. APSys 2021: 138-145 - [c21]Nanzi Yang, Wenbo Shen, Jinku Li, Yutian Yang, Kangjie Lu, Jietao Xiao, Tianyu Zhou, Chenggang Qin, Wang Yu, Jianfeng Ma, Kui Ren:
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization. CCS 2021: 764-778 - [c20]Qiang Liu, Cen Zhang, Lin Ma, Muhui Jiang, Yajin Zhou, Lei Wu, Wenbo Shen, Xiapu Luo, Yang Liu, Kui Ren:
FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution. ASE 2021: 792-804 - [c19]Yutian Yang, Wenbo Shen, Bonan Ruan, Wenmao Liu, Kui Ren:
Security Challenges in the Container Cloud. TPS-ISA 2021: 137-145 - [i5]Lin Ma, Jinyan Xu, Jiadong Sun, Yajin Zhou, Xun Xie, Wenbo Shen, Rui Chang, Kui Ren:
Revisiting Challenges for Selective Data Protection of Real Applications. CoRR abs/2105.14251 (2021) - 2020
- [c18]Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren:
PESC: A Per System-Call Stack Canary Design for Linux Kernel. CODASPY 2020: 365-375
2010 – 2019
- 2019
- [c17]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. AsiaCCS 2019: 633-645 - [c16]Jinsong Han, Feng Lin, Wenbo Shen, Kui Ren:
Trustworthy Authentication for IoT with Human-and-Environment-in-the-Loop. SocialSens@CPSIoTWeek 2019: 3-4 - [c15]Tong Zhang, Wenbo Shen, Dongyoon Lee, Changhee Jung, Ahmed M. Azab, Ruowen Wang:
PeX: A Permission Check Analysis Framework for Linux Kernel. USENIX Security Symposium 2019: 1205-1220 - [i4]Yaohui Chen, Dongliang Mu, Jun Xu, Zhichuang Sun, Wenbo Shen, Xinyu Xing, Long Lu, Bing Mao:
PTrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. CoRR abs/1905.10499 (2019) - [i3]Yutian Yang, Songbo Zhu, Wenbo Shen, Yajin Zhou, Jiadong Sun, Kui Ren:
ARM Pointer Authentication based Forward-Edge and Backward-Edge Control Flow Integrity for Kernels. CoRR abs/1912.10666 (2019) - 2017
- [j4]Mei Zhang, Tingting Qing, Jin-Hui Zhu, Wenbo Shen:
Indoor positioning tracking with magnetic field and improved particle filter. Int. J. Distributed Sens. Networks 13(11) (2017) - [j3]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu, Tao Wang:
Virtual Multipath Attack and Defense for Location Distinction in Wireless Networks. IEEE Trans. Mob. Comput. 16(2): 566-580 (2017) - [c14]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c13]Yaohui Chen, Dongli Zhang, Ruowen Wang, Rui Qiao, Ahmed M. Azab, Long Lu, Hayawardh Vijayakumar, Wenbo Shen:
NORAX: Enabling Execute-Only Memory for COTS Binaries on AArch64. IEEE Symposium on Security and Privacy 2017: 304-319 - 2016
- [j2]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning, Rudra Dutta:
Toward Proper Guard Zones for Link Signature. IEEE Trans. Wirel. Commun. 15(3): 2104-2117 (2016) - [c12]Ahmed M. Azab, Kirk Swidowski, Rohan Bhutkar, Jia Ma, Wenbo Shen, Ruowen Wang, Peng Ning:
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM. NDSS 2016 - [i2]Jacob D. Abernethy, Cyrus Anderson, Chengyu Dai, Arya Farahi, Linh Nguyen, Adam Rauh, Eric M. Schwartz, Wenbo Shen, Guangsha Shi, Jonathan C. Stroud, Xinyu Tan, Jared Webb, Sheng Yang:
Flint Water Crisis: Data-Driven Risk Assessment Via Residential Water Testing. CoRR abs/1610.00580 (2016) - [i1]Jacob D. Abernethy, Cyrus Anderson, Alex Chojnacki, Chengyu Dai, John Dryden, Eric M. Schwartz, Wenbo Shen, Jonathan C. Stroud, Laura Wendlandt, Sheng Yang, Daniel T. Zhang:
Data Science in Service of Performing Arts: Applying Machine Learning to Predicting Audience Preferences. CoRR abs/1611.05788 (2016) - 2015
- [j1]Kang Zhao, Wenbo Shen:
Parallel Stimulus Generation Based on Model Checking for Coherence Protocol Verification. IEEE Trans. Very Large Scale Integr. Syst. 23(12): 3124-3128 (2015) - [c11]Wenbo Shen, Yao Liu, Xiaofan He, Huaiyu Dai, Peng Ning:
No time to demodulate - fast physical layer verification of friendly jamming. MILCOM 2015: 653-658 - 2014
- [c10]Ahmed M. Azab, Peng Ning, Jitesh Shah, Quan Chen, Rohan Bhutkar, Guruprasad Ganesh, Jia Ma, Wenbo Shen:
Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. CCS 2014: 90-102 - [c9]Xiaofan He, Huaiyu Dai, Yufan Huang, Dong Wang, Wenbo Shen, Peng Ning:
The security of link signature: A view from channel models. CNS 2014: 103-108 - [c8]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai, Yao Liu:
MCR Decoding: A MIMO approach for defending against wireless jamming attacks. CNS 2014: 133-138 - [c7]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Channel correlation modeling for link signature security assessment. HotSoS 2014: 25 - [c6]Song Fang, Yao Liu, Wenbo Shen, Haojin Zhu:
Where are you from?: confusing location distinction using virtual multipath camouflage. MobiCom 2014: 225-236 - 2013
- [c5]Xiaofan He, Huaiyu Dai, Wenbo Shen, Peng Ning:
Is link signature dependable for wireless security? INFOCOM 2013: 200-204 - [c4]Wenbo Shen, Peng Ning, Xiaofan He, Huaiyu Dai:
Ally Friendly Jamming: How to Jam Your Enemy and Maintain Your Own Wireless Connectivity at the Same Time. IEEE Symposium on Security and Privacy 2013: 174-188 - 2010
- [c3]Qigang Wang, Rolf Kassa, Wenbo Shen, Nelson Ijih, Bhushan Chitlur, Michael Konow, Dong Liu, Arthur Sheiman, Prabhat Gupta:
An FPGA Based Hybrid Processor Emulation Platform. FPL 2010: 25-30
2000 – 2009
- 2009
- [c2]Liu Ling, Neal Oliver, Bhushan Chitlur, Qigang Wang, Alvin Chen, Wenbo Shen, Zhihong Yu, Arthur Sheiman, Ian McCallum, Joseph Grecco, Henry Mitchel, Dong Liu, Prabhat Gupta:
High-performance, energy-efficient platforms using in-socket FPGA accelerators. FPGA 2009: 261-264 - 2007
- [c1]Qing Wang, Wenbo Shen, Yu Li, Zhenbo Zhu:
Design of IP Media Accelerator. ICME 2007: 1195-1198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint