Le Guan
Le Guan
Department of Computer Science at the University of Georgia
Dirección de correo verificada de - Página principal
Citado por
Citado por
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang
arXiv preprint arXiv:1811.03241, 2018
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
Copker: Computing with Private Keys without RAM.
L Guan, J Lin, B Luo, J Jing
NDSS, 23-26, 2014
Systematic assessment of cyber-physical security of energy management system for connected and automated electric vehicles
L Guo, B Yang, J Ye, H Chen, F Li, W Song, L Du, L Guan
IEEE Transactions on Industrial Informatics 17 (5), 3335-3347, 2020
Cyber–physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions
J Ye, L Guo, B Yang, F Li, L Du, L Guan, W Song
IEEE Journal of Emerging and Selected Topics in Power Electronics 9 (4 …, 2020
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.
W Zhou, L Guan, P Liu, Y Zhang
USENIX Security Symposium, 2007-2024, 2021
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Annual Computer Security Applications Conference, 746-759, 2020
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
From physical to cyber: Escalating protection for personalized auto insurance
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang
arXiv preprint arXiv:1706.05779, 2017
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
Copker: a cryptographic engine against cold-boot attacks
L Guan, J Lin, Z Ma, B Luo, L Xia, J Jing
IEEE Transactions on Dependable and Secure Computing 15 (5), 742-754, 2016
CryptMe: Data leakage prevention for unmodified programs on ARM devices
C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles
P Guo, H Kim, L Guan, M Zhu, P Liu
Security and Privacy in Communication Networks: 13th International …, 2018
Method and system for protecting root CA certificate in a virtualization environment
LIN Jingqiang, J Jing, G Le, B Li, J Wang, W Pan, Y Wang
US Patent 9,819,496, 2017
Good motive but bad design: Why ARM MPU has become an outcast in embedded systems
W Zhou, L Guan, P Liu, Y Zhang
arXiv preprint arXiv:1908.03638, 2019
From library portability to para-rehosting: Natively executing microcontroller software on commodity hardware
W Li, L Guan, J Lin, J Shi, F Li
arXiv preprint arXiv:2107.12867, 2021
Reviewing IoT security via logic bugs in IoT platforms and systems
W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ...
IEEE Internet of Things Journal 8 (14), 11621-11639, 2021
Protecting mobile devices from physical memory attacks with targeted encryption
L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia, B Luo
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20