Author image not provided
 Yangchun Fu

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article5.67
Citation Count51
Publication count9
Publication years2012-2015
Available for download7
Average downloads per article420.86
Downloads (cumulative)2,946
Downloads (12 Months)301
Downloads (6 Weeks)34
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


9 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 9 of 9
Sort by:

1 published by ACM
August 2015 ESEC/FSE 2015: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 6,   Downloads (12 Months): 54,   Downloads (Overall): 205

Full text available: PDFPDF
Given a crash dump or a kernel memory snapshot, it is often desirable to have a capability that can traverse its pointers to locate the root cause of the crash, or check their integrity to detect the control flow hijacks. To achieve this, one key challenge lies in how to ...
Keywords: Kernel Integrity, memory forensics, taint analysis

2
July 2015 HotCloud'15: Proceedings of the 7th USENIX Conference on Hot Topics in Cloud Computing
Publisher: USENIX Association
Bibliometrics:
Citation Count: 0

Graphics processing units (GPUs) have been adopted by major cloud vendors, as GPUs provide orders-of-magnitude speedup for computation-intensive data-parallel applications. In the cloud, efficiently sharing GPU resources among multiple virtual machines (VMs) is not so straightforward. Recent research has been conducted to develop GPU virtualization technologies, making it feasible for ...

3 published by ACM
March 2015 VEE '15: Proceedings of the 11th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 3,   Downloads (12 Months): 77,   Downloads (Overall): 826

Full text available: PDFPDF
Over the past 20 years, we have witnessed a widespread adoption of dynamic binary instrumentation (DBI) for numerous program analyses and security applications including program debugging, profiling, reverse engineering, and malware analysis. To date, there are many DBI platforms, and the most popular one is Pin, which provides various instrumentation ...
Keywords: dynamic binary instrumentation, introspection
Also published in:
August 2015  ACM SIGPLAN Notices - VEE '15: Volume 50 Issue 7, July 2015

4
June 2014 USENIX ATC'14: Proceedings of the 2014 USENIX conference on USENIX Annual Technical Conference
Publisher: USENIX Association
Bibliometrics:
Citation Count: 3

To direct the operation of a computer, we often use a shell, a user interface that provides accesses to the OS kernel services. Traditionally, shells are designed atop an OS kernel. In this paper, we show that a shell can also be designed below an OS. More specifically, we present ...

5 published by ACM
December 2013 ACSAC '13: Proceedings of the 29th Annual Computer Security Applications Conference
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 11,   Downloads (Overall): 170

Full text available: PDFPDF
Recent advances in bridging the semantic gap between virtual machines (VMs) and their guest processes have a dark side: They can be abused to subvert and compromise VM file system images and process images. To demonstrate this alarming capability, a context-aware, reactive VM Introspection (VMI) instrument is presented and leveraged ...
Keywords: virtual machine introspection, authentication, reverse engineering

6 published by ACM
November 2013 CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Publisher: ACM
Bibliometrics:
Citation Count: 11
Downloads (6 Weeks): 2,   Downloads (12 Months): 42,   Downloads (Overall): 449

Full text available: PDFPDF
With the wide existence of binary code, it is desirable to reuse it in many security applications, such as malware analysis and software patching. While prior approaches have shown that binary code can be extracted and reused, they are often based on static analysis and face challenges when coping with ...
Keywords: binary code reuse, taint analysis, trace-oriented programming, dynamic decompilation

7 published by ACM
September 2013 ACM Transactions on Information and System Security (TISSEC): Volume 16 Issue 2, September 2013
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 10,   Downloads (12 Months): 43,   Downloads (Overall): 549

Full text available: PDFPDF
It is generally believed to be a tedious, time-consuming, and error-prone process to develop a virtual machine introspection (VMI) tool because of the semantic gap. Recent advance shows that the semantic-gap can be largely narrowed by reusing the executed code from a trusted OS kernel. However, the limitation for such ...

8 published by ACM
March 2013 VEE '13: Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Publisher: ACM
Bibliometrics:
Citation Count: 10
Downloads (6 Weeks): 4,   Downloads (12 Months): 33,   Downloads (Overall): 367

Full text available: PDFPDF
This paper presents EXTERIOR, a dual-VM architecture based external shell that can be used for trusted, timely out-of-VM management of guest-OS such as introspection, configuration, and recovery. Inspired by recent advances in virtual machine introspection (VMI), EXTERIOR leverages an isolated, secure virtual machine (SVM) to introspect the kernel state of ...
Keywords: cloud computing, virtual machine introspection
Also published in:
August 2013  ACM SIGPLAN Notices - VEE '13: Volume 48 Issue 7, July 2013

9 published by ACM
October 2012 SoCC '12: Proceedings of the Third ACM Symposium on Cloud Computing
Publisher: ACM
Bibliometrics:
Citation Count: 15
Downloads (6 Weeks): 8,   Downloads (12 Months): 41,   Downloads (Overall): 380

Full text available: PDFPDF
Precise fingerprinting of an operating system (OS) is critical to many security and virtual machine (VM) management applications in the cloud, such as VM introspection, penetration testing, guest OS administration (e.g., kernel update), kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU ...
Keywords: operating system fingerprinting, cloud computing, memory forensics, virtual machine introspection



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us