What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuewu Wang
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
Mitigating the Unprivileged User Namespaces Based Privilege Escalation Attacks with Linux Capabilities.
Jingzi Meng
Yuewu Wang
Lingguang Lei
Chunjing Kou
Peng Wang
Huawei Lu
2025
conf/crypto
How to Recover the Full Plaintext of XCB.
Peng Wang
Shuping Mao
Ruozhou Xu
Jiwu Jing
Yuewu Wang
2025
conf/esorics
DEBridge: Towards Secure and Practical Plausibly Deniable Encryption Based on USB Bridge Controller.
Chongyu Long
Yuewu Wang
Lingguang Lei
Haoyang Xing
Jiwu Jing
2024
journals/tifs
Condo: Enhancing Container Isolation Through Kernel Permission Data Protection.
Shouyin Xu
Yuewu Wang
Lingguang Lei
Kun Sun
Jiwu Jing
Siyuan Ma
Jie Wang
Heqing Huang
2024
conf/esorics
ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme Based on RP Anonymization.
Junlin He
Lingguang Lei
Yuewu Wang
Pingjian Wang
Jiwu Jing
2022
journals/tifs
TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform.
Yanchu Li
Lingguang Lei
Yuewu Wang
Jiwu Jing
Quan Zhou
2022
conf/esorics
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator.
Lipeng Wan
Fangyu Zheng
Guang Fan
Rong Wei
Lili Gao
Yuewu Wang
Jingqiang Lin
Jiankuo Dong
2021
conf/acsac
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment.
Rong Wei
Fangyu Zheng
Lili Gao
Jiankuo Dong
Guang Fan
Lipeng Wan
Jingqiang Lin
Yuewu Wang
2020
conf/ccs
Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments.
Jie Wang
Kun Sun
Lingguang Lei
Shengye Wan
Yuewu Wang
Jiwu Jing
2019
journals/compsec
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Chong Guan
Kun Sun
Lingguang Lei
Pingjian Wang
Yuewu Wang
Wei Chen
2019
conf/esorics
OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.
Dawei Chu
Yuewu Wang
Lingguang Lei
Yanchu Li
Jiwu Jing
Kun Sun
2018
conf/icisc
How to Block the Malicious Access to Android External Storage.
Sisi Yuan
Yuewu Wang
Pingjian Wang
Lingguang Lei
Quan Zhou
Jun Li
2018
conf/acsac
A Measurement Study on Linux Container Security: Attacks and Countermeasures.
Xin Lin
Lingguang Lei
Yuewu Wang
Jiwu Jing
Kun Sun
Quan Zhou
2017
conf/ccs
Vulnerable Implicit Service: A Revisit.
Lingguang Lei
Yi He
Kun Sun
Jiwu Jing
Yuewu Wang
Qi Li
Jian Weng
2017
conf/acisp
Splitting Third-Party Libraries' Privileges from Android Apps.
Jiawei Zhan
Quan Zhou
Xiaozhuo Gu
Yuewu Wang
Yingjiao Niu
2015
journals/tifs
Reliable and Trustworthy Memory Acquisition on Smartphones.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
2015
conf/ccs
TrustOTP: Transforming Smartphones into Secure One-Time Password Tokens.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
2015
conf/ndss
DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices.
Xueqiang Wang
Kun Sun
Yuewu Wang
Jiwu Jing
2015
conf/dsn
TrustICE: Hardware-Assisted Isolated Computing Environments on Mobile Devices.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
Haining Wang
2014
conf/acisp
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System.
Zhongwen Zhang
Yuewu Wang
Jiwu Jing
Qiongxiao Wang
Lingguang Lei
2014
conf/icisc
WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.
Xueqiang Wang
Yuewu Wang
Limin Liu
Lingguang Lei
Jiwu Jing
2014
conf/esorics
TrustDump: Reliable Memory Acquisition on Smartphones.
He Sun
Kun Sun
Yuewu Wang
Jiwu Jing
Sushil Jajodia
2012
conf/icisc
MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring.
Lingguang Lei
Yuewu Wang
Jiwu Jing
Zhongwen Zhang
Xingjie Yu
Coauthors
Chong Guan
(1)
Chongyu Long
(1)
Chunjing Kou
(1)
Dawei Chu
(1)
Fangyu Zheng
(2)
Guang Fan
(2)
Haining Wang
(1)
Haoyang Xing
(1)
He Sun
(4)
Heqing Huang
(1)
Huawei Lu
(1)
Jian Weng
(1)
Jiankuo Dong
(2)
Jiawei Zhan
(1)
Jie Wang
(2)
Jingqiang Lin
(2)
Jingzi Meng
(1)
Jiwu Jing
(17)
Jun Li
(1)
Junlin He
(1)
Kun Sun
(11)
Lili Gao
(2)
Limin Liu
(1)
Lingguang Lei
(14)
Lipeng Wan
(2)
Peng Wang
(1)
Peng Wang
(1)
Pingjian Wang
(3)
Qi Li
(1)
Qiongxiao Wang
(1)
Quan Zhou
(4)
Rong Wei
(2)
Ruozhou Xu
(1)
Shengye Wan
(1)
Shouyin Xu
(1)
Shuping Mao
(1)
Sisi Yuan
(1)
Siyuan Ma
(1)
Sushil Jajodia
(1)
Wei Chen
(1)
Xiaozhuo Gu
(1)
Xin Lin
(1)
Xingjie Yu
(1)
Xueqiang Wang
(2)
Yanchu Li
(2)
Yi He
(1)
Yingjiao Niu
(1)
Yuewu Wang
(23)
Zhongwen Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to