A list of academic articles

2023

  1. CCS
    Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation
    Zhi Li, Weijie Liu, XiaoFeng Wang, and 4 more authors
    In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022

  1. JAMIA
    The evolving privacy and security concerns for genomic data analysis and sharing as observed from the iDASH competition
    Tsung-Ting Kuo, Xiaoqian Jiang, Haixu Tang, and 8 more authors
    Journal of the American Medical Informatics Association, 2022
  2. Oakland
    Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms
    Zhi Li, Weijie Liu, Hongbo Chen, and 6 more authors
    In 2022 IEEE Symposium on Security and Privacy (SP), 2022
  3. TIFS
    Retrofitting LBR Profiling to Enhance Virtual Machine Introspection
    Weijie Liu, Ximeng Liu, Zhi Li, and 3 more authors
    IEEE Transactions on Information Forensics and Security, 2022

2021

  1. DSN
    Practical and Efficient in-Enclave Verification of Privacy Compliance
    Weijie Liu, Wenhao Wang, Hongbo Chen, and 7 more authors
    In 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021
  2. TDSC
    Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services
    Wenhao Wang, Weijie Liu, Hongbo Chen, and 3 more authors
    IEEE Transactions on Dependable and Secure Computing, 2021
  3. ASPLOS
    Incremental CFG Patching for Binary Rewriting
    Xiaozhu Meng, and Weijie Liu
    In Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020

  1. ISPA
    Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks
    Yaosong Lu, Weijie Liu, and Wenhao Wang
    In 2020 IEEE Intl Conf on Parallel Distributed Processing with Applications, Big Data Cloud Computing, Sustainable Computing Communications, Social Computing Networking (ISPA/BDCloud/SocialCom/SustainCom), 2020

2019

  1. Tsinghua
    Memway: in-memorywaylaying acceleration for practical rowhammer attacks against binaries
    Lai Xu, Rongwei Yu, Lina Wang, and 1 more author
    Tsinghua Science and Technology, 2019

2018

  1. IET
    Factoring two-dimensional two-channel non-separable stripe filter banks into lifting steps
    Bin Liu, and Weijie Liu
    IET Image Processing, 2018
  2. ICA3PP
    Controlled Channel Attack Detection Based on Hardware Virtualization
    Chenyi Qiang, Weijie Liu, Lina Wang, and 1 more author
    In International Conference on Algorithms and Architectures for Parallel Processing, 2018

2017

  1. ESORICS
    On-demand time blurring to support side-channel defense
    Weijie Liu, Debin Gao, and Michael K Reiter
    In European Symposium on Research in Computer Security, 2017
  2. PCM
    Construction of Sampling Two-Channel Nonseparable Wavelet Filter Bank and Its Fusion Application for Multispectral Image Pansharpening
    Bin Liu, Weijie Liu, and Longxiang Xu
    In Pacific Rim Conference on Multimedia, 2017

2016

  1. SCN
    A novel covert channel detection method in cloud based on XSRM and improved event association algorithm
    Lina Wang, Weijie Liu, Neeraj Kumar, and 3 more authors
    Security and Communication Networks, 2016