A list of academic articles.

2022

  1. Oakland
    Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms Li, Zhi, Liu, Weijie, Chen, Hongbo, Wang, XiaoFeng, Liao, Xiaojing, Xing, Luyi, Zha, Mingming, Jin, Hai, and Zou, Deqing In 2022 IEEE Symposium on Security and Privacy (SP) 2022
  2. TIFS
    Retrofitting LBR Profiling to Enhance Virtual Machine Introspection Liu, Weijie, Liu, Ximeng, Li, Zhi, Liu, Bin, Yu, Rongwei, and Wang, Lina IEEE Transactions on Information Forensics and Security 2022

2021

  1. DSN
    Practical and Efficient in-Enclave Verification of Privacy Compliance Liu, Weijie, Wang, Wenhao, Chen, Hongbo, Wang, XiaoFeng, Lu, Yaosong, Chen, Kai, Wang, Xinyu, Shen, Qintao, Chen, Yi, and Tang, Haixu In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2021
  2. TDSC
    Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services Wang, Wenhao, Liu, Weijie, Chen, Hongbo, Wang, Xiaofeng, Tian, Hongliang, and Lin, Dongdai IEEE Transactions on Dependable and Secure Computing 2021
  3. ASPLOS
    Incremental CFG Patching for Binary Rewriting Meng, Xiaozhu, and Liu, Weijie In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems 2021

2020

  1. ISPA
    Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks Lu, Yaosong, Liu, Weijie, and Wang, Wenhao In 2020 IEEE Intl Conf on Parallel Distributed Processing with Applications, Big Data Cloud Computing, Sustainable Computing Communications, Social Computing Networking (ISPA/BDCloud/SocialCom/SustainCom) 2020

2019

  1. Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries Xu, Lai, Yu, Rongwei, Wang, Lina, and Liu, Weijie Tsinghua Science and Technology 2019

2018

  1. IET
    Factoring two-dimensional two-channel non-separable stripe filter banks into lifting steps Liu, Bin, and Liu, Weijie IET Image Processing 2018
  2. The lifting factorization of 2D 4-channel nonseparable wavelet transforms Liu, Bin, and Liu, Weijie Information Sciences 2018
  3. CAPT: Context-aware provenance tracing for attack investigation Tan, Cheng, Zhao, Lei, Liu, Weijie, Xu, Lai, and Wang, Lina China Communications 2018
  4. ICA3PP
    Controlled Channel Attack Detection Based on Hardware Virtualization Qiang, Chenyi, Liu, Weijie, Wang, Lina, and Yu, Rongwei In International Conference on Algorithms and Architectures for Parallel Processing 2018

2017

  1. ESORICS
    On-demand time blurring to support side-channel defense Liu, Weijie, Gao, Debin, and Reiter, Michael K In European Symposium on Research in Computer Security 2017
  2. PCM
    Construction of Sampling Two-Channel Nonseparable Wavelet Filter Bank and Its Fusion Application for Multispectral Image Pansharpening Liu, Bin, Liu, Weijie, and Xu, Longxiang In Pacific Rim Conference on Multimedia 2017

2016

  1. SCN
    A novel covert channel detection method in cloud based on XSRM and improved event association algorithm Wang, Lina, Liu, Weijie, Kumar, Neeraj, He, Debiao, Tan, Cheng, and Gao, Debin Security and Communication Networks 2016