Seguir
Le Guan
Le Guan
Department of Computer Science at the University of Georgia
Dirección de correo verificada de cs.uga.edu - Página principal
Título
Citado por
Citado por
Año
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
1372017
Discovering and understanding the security hazards in the interactions between iot devices, mobile apps, and clouds on smart home platforms
W Zhou, Y Jia, Y Yao, L Zhu, L Guan, Y Mao, P Liu, Y Zhang
arXiv preprint arXiv:1811.03241, 2018
1242018
Protecting private keys against memory disclosure attacks using hardware transactional memory
L Guan, J Lin, B Luo, J Jing, J Wang
2015 IEEE Symposium on Security and Privacy, 3-19, 2015
1172015
Copker: Computing with Private Keys without RAM.
L Guan, J Lin, B Luo, J Jing
NDSS, 23-26, 2014
652014
Systematic assessment of cyber-physical security of energy management system for connected and automated electric vehicles
L Guo, B Yang, J Ye, H Chen, F Li, W Song, L Du, L Guan
IEEE Transactions on Industrial Informatics 17 (5), 3335-3347, 2020
352020
Cyber–physical security of powertrain systems in modern electric vehicles: Vulnerabilities, challenges, and future visions
J Ye, L Guo, B Yang, F Li, L Du, L Guan, W Song
IEEE Journal of Emerging and Selected Topics in Power Electronics 9 (4 …, 2020
272020
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference.
W Zhou, L Guan, P Liu, Y Zhang
USENIX Security Symposium, 2007-2024, 2021
242021
Device-agnostic firmware execution is possible: A concolic execution approach for peripheral emulation
C Cao, L Guan, J Ming, P Liu
Annual Computer Security Applications Conference, 746-759, 2020
232020
Supporting transparent snapshot for bare-metal malware analysis on mobile devices
L Guan, S Jia, B Chen, F Zhang, B Luo, J Lin, P Liu, X Xing, L Xia
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
202017
From physical to cyber: Escalating protection for personalized auto insurance
L Guan, J Xu, S Wang, X Xing, L Lin, H Huang, P Liu, W Lee
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems CD …, 2016
192016
Hey, you, keep away from my device: remotely implanting a virus expeller to defeat Mirai on IoT devices
C Cao, L Guan, P Liu, N Gao, J Lin, J Xiang
arXiv preprint arXiv:1706.05779, 2017
172017
Building a trustworthy execution environment to defeat exploits from both cyber space and physical space for ARM
L Guan, C Cao, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
IEEE Transactions on Dependable and Secure Computing 16 (3), 438-453, 2018
162018
Copker: a cryptographic engine against cold-boot attacks
L Guan, J Lin, Z Ma, B Luo, L Xia, J Jing
IEEE Transactions on Dependable and Secure Computing 15 (5), 742-754, 2016
162016
CryptMe: Data leakage prevention for unmodified programs on ARM devices
C Cao, L Guan, N Zhang, N Gao, J Lin, B Luo, P Liu, J Xiang, W Lou
Research in Attacks, Intrusions, and Defenses: 21st International Symposium …, 2018
142018
VCIDS: Collaborative intrusion detection of sensor and actuator attacks on connected vehicles
P Guo, H Kim, L Guan, M Zhu, P Liu
Security and Privacy in Communication Networks: 13th International …, 2018
122018
Method and system for protecting root CA certificate in a virtualization environment
LIN Jingqiang, J Jing, G Le, B Li, J Wang, W Pan, Y Wang
US Patent 9,819,496, 2017
122017
Good motive but bad design: Why ARM MPU has become an outcast in embedded systems
W Zhou, L Guan, P Liu, Y Zhang
arXiv preprint arXiv:1908.03638, 2019
112019
From library portability to para-rehosting: Natively executing microcontroller software on commodity hardware
W Li, L Guan, J Lin, J Shi, F Li
arXiv preprint arXiv:2107.12867, 2021
92021
Reviewing IoT security via logic bugs in IoT platforms and systems
W Zhou, C Cao, D Huo, K Cheng, L Zhang, L Guan, T Liu, Y Jia, Y Zheng, ...
IEEE Internet of Things Journal 8 (14), 11621-11639, 2021
72021
Protecting mobile devices from physical memory attacks with targeted encryption
L Guan, C Cao, S Zhu, J Lin, P Liu, Y Xia, B Luo
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
72019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20