Sign in
Wenhao Wang
ORCID
Publication Activity (10 Years)
Years Active: 2011-2023
Publications (10 Years): 22
Top Topics
Countermeasures
Execution Environment
Boolean Functions
Prime Implicants
Top Venues
CoRR
IEEE Symposium on Security and Privacy
CCS
IEEE Trans. Dependable Secur. Comput.
</>
Publications
</>
Zhi Zhang
,
Wei He
,
Yueqiang Cheng
,
Wenhao Wang
,
Yansong Gao
,
Dongxi Liu
,
Kang Li
,
Surya Nepal
,
Anmin Fu
,
Yi Zou
Implicit Hammer: Cross-Privilege-Boundary Rowhammer Through Implicit Accesses.
IEEE Trans. Dependable Secur. Comput.
20 (5) (2023)
Wenhao Wang
,
Weijie Liu
,
Hongbo Chen
,
XiaoFeng Wang
,
Hongliang Tian
,
Dongdai Lin
Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services.
IEEE Trans. Dependable Secur. Comput.
20 (1) (2023)
Zihao Wang
,
Jiale Guan
,
XiaoFeng Wang
,
Wenhao Wang
,
Luyi Xing
,
Fares Alharbi
The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning.
CCS
(2023)
Wei Song
,
Boya Li
,
Zihan Xue
,
Zhenzhen Li
,
Wenhao Wang
,
Peng Liu
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
IEEE Symposium on Security and Privacy
(2021)
Wei Song
,
Boya Li
,
Zihan Xue
,
Zhenzhen Li
,
Wenhao Wang
,
Peng Liu
Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It.
CoRR
(2020)
Tianlin Huo
,
Xiaoni Meng
,
Wenhao Wang
,
Chunliang Hao
,
Pei Zhao
,
Jian Zhai
,
Mingshu Li
Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX.
IACR Trans. Cryptogr. Hardw. Embed. Syst.
2020 (1) (2020)
Jianping Zhu
,
Rui Hou
,
XiaoFeng Wang
,
Wenhao Wang
,
Jiangfeng Cao
,
Boyan Zhao
,
Zhongpu Wang
,
Yuhui Zhang
,
Jiameng Ying
,
Lixin Zhang
,
Dan Meng
Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment.
IEEE Symposium on Security and Privacy
(2020)
Weijie Liu
,
Wenhao Wang
,
XiaoFeng Wang
,
Xiaozhu Meng
,
Yaosong Lu
,
Hongbo Chen
,
Xinyu Wang
,
Qingtao Shen
,
Kai Chen
,
Haixu Tang
,
Yi Chen
,
Luyi Xing
Confidential Attestation: Efficient in-Enclave Verification of Privacy Policy Compliance.
CoRR
(2020)
Yaosong Lu
,
Weijie Liu
,
Wenhao Wang
Atomic Restriction: Hardware Atomization to Defend Against Preemption Attacks.
ISPA/BDCloud/SocialCom/SustainCom
(2020)
Tianlin Huo
,
Wenhao Wang
,
Pei Zhao
,
Yufeng Li
,
Tingting Wang
,
Mingshu Li
TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks.
TrustCom
(2020)
Wenhao Wang
,
Yichen Jiang
,
Qintao Shen
,
Weihao Huang
,
Hao Chen
,
Shuang Wang
,
Xiaofeng Wang
,
Haixu Tang
,
Kai Chen
,
Kristin E. Lauter
,
Dongdai Lin
Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance.
CoRR
(2019)
Jianping Zhu
,
Rui Hou
,
XiaoFeng Wang
,
Wenhao Wang
,
Jiangfeng Cao
,
Lutan Zhao
,
Fengkai Yuan
,
Peinan Li
,
Zhongpu Wang
,
Boyan Zhao
,
Lixin Zhang
,
Dan Meng
Enabling Privacy-Preserving, Compute- and Data-Intensive Computing using Heterogeneous Trusted Execution Environment.
CoRR
(2019)
Meicheng Liu
,
Jingchun Yang
,
Wenhao Wang
,
Dongdai Lin
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
EUROCRYPT (2)
(2018)
Zhe Zhou
,
Di Tang
,
Wenhao Wang
,
Xiaofeng Wang
,
Zhou Li
,
Kehuan Zhang
Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection.
ACSAC
(2018)
Guoxing Chen
,
Wenhao Wang
,
Tianyu Chen
,
Sanchuan Chen
,
Yinqian Zhang
,
XiaoFeng Wang
,
Ten-Hwang Lai
,
Dongdai Lin
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
IEEE Symposium on Security and Privacy
(2018)
Meicheng Liu
,
Jingchun Yang
,
Wenhao Wang
,
Dongdai Lin
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery.
IACR Cryptol. ePrint Arch.
2018 (2018)
Jingchun Yang
,
Meicheng Liu
,
Dongdai Lin
,
Wenhao Wang
Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK.
IWSEC
(2018)
Shuai Wang
,
Wenhao Wang
,
Qinkun Bao
,
Pei Wang
,
XiaoFeng Wang
,
Dinghao Wu
Binary Code Retrofitting and Hardening Using SGX.
FEAST@CCS
(2017)
Wenhao Wang
,
Guoxing Chen
,
Xiaorui Pan
,
Yinqian Zhang
,
XiaoFeng Wang
,
Vincent Bindschaedler
,
Haixu Tang
,
Carl A. Gunter
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
CCS
(2017)
Wenhao Wang
,
Guoxing Chen
,
Xiaorui Pan
,
Yinqian Zhang
,
XiaoFeng Wang
,
Vincent Bindschaedler
,
Haixu Tang
,
Carl A. Gunter
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
CoRR
(2017)
Wenhao Wang
Notes on Rainbow Distinguished Point Method.
CoRR
(2015)
Meicheng Liu
,
Dongdai Lin
,
Wenhao Wang
Searching cubes for testing Boolean functions and its application to Trivium.
ISIT
(2015)
Wenhao Wang
,
Dongdai Lin
Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited.
ICICS
(2013)
Wenhao Wang
,
Meicheng Liu
,
Yin Zhang
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation".
Cryptogr. Commun.
5 (1) (2013)
Zhenqi Li
,
Yao Lu
,
Wenhao Wang
,
Bin Zhang
,
Dongdai Lin
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
ICICS
(2012)
Wenhao Wang
,
Dongdai Lin
,
Zhenqi Li
,
Tianze Wang
Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications.
ICICS
(2011)