Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger.
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys’17 (Acceptance rate: 34⁄188=18.1%),
2017.
Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia.
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices.
Proceedings of the 33rd Annual Computer Security Applications Conference, ACSAC’17 (Acceptance rate: 48⁄244=19.7%, Best Paper Award),
2017.
Le Guan, Fengjun Li, Jiwu Jing, Jing Wang, Ziqiang Ma.
virtio-ct: A Secure Cryptographic Token Service in Hypervisors.
International Conference on Security and Privacy in Communication Networks: 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part II,
2015.
Le Guan, Jingqiang Lin, Bo Luo, Jiwu Jing.
Copker: Computing with Private Keys without RAM.
21st Annual Network and Distributed System Security Symposium, NDSS’14 (Acceptance rate: 55⁄295=18.6%),
2014.
Jing Wang, Le Guan, Limin Liu, Daren Zha.
Implementing a Covert Timing Channel Based on Mimic Function.
Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings,
2014.