default search action
Weidong Cui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Ziqiao Zhou, Anjali, Weiteng Chen, Sishuai Gong, Chris Hawblitzel, Weidong Cui:
VeriSMo: A Verified Security Module for Confidential VMs. OSDI 2024: 599-614 - [i5]Chenyuan Yang, Xuheng Li, Md Rakib Hossain Misu, Jianan Yao, Weidong Cui, Yeyun Gong, Chris Hawblitzel, Shuvendu K. Lahiri, Jacob R. Lorch, Shuai Lu, Fan Yang, Ziqiao Zhou, Shan Lu:
AutoVerus: Automated Proof Generation for Rust Code. CoRR abs/2409.13082 (2024) - 2023
- [j2]Xiankai Cheng, Benkun Bao, Weidong Cui, Shuai Liu, Jun Zhong, Liming Cai, Hongbo Yang:
Classification and Analysis of Human Body Movement Characteristics Associated with Acrophobia Induced by Virtual Reality Scenes of Heights. Sensors 23(12): 5482 (2023) - [c31]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services. OSDI 2023: 193-208 - [c30]Ziqiao Zhou, Yizhou Shan, Weidong Cui, Xinyang Ge, Marcus Peinado, Andrew Baumann:
Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud. OSDI 2023: 247-267 - [i4]Jianan Yao, Ziqiao Zhou, Weiteng Chen, Weidong Cui:
Leveraging Large Language Models for Automated Proof Synthesis in Rust. CoRR abs/2311.03739 (2023) - [i3]Yu Hao, Weiteng Chen, Ziqiao Zhou, Weidong Cui:
E&V: Prompting Large Language Models to Perform Static Analysis by Pseudo-code Execution and Verification. CoRR abs/2312.08477 (2023) - [i2]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services (extended version). IACR Cryptol. ePrint Arch. 2023: 761 (2023) - 2022
- [j1]Jun Zhong, Yongfeng Liu, Xiankai Cheng, Liming Cai, Weidong Cui, Dong Hai:
Gated Recurrent Unit Network for Psychological Stress Classification Using Electrocardiograms from Wearable Devices. Sensors 22(22): 8664 (2022) - [c29]Xinyang Ge, Hsuan-Chi Kuo, Weidong Cui:
Hecate: Lifting and Shifting On-Premises Workloads to an Untrusted Cloud. CCS 2022: 1231-1242 - [c28]Junbin Zhang, Dewei Zhang, Fengwei Hou, Wanqiu Jiang, Pei Liu, Weidong Cui:
Research on Fault Diagnosis Technology of Model Support System based on Feature Extraction. ISCID 2022: 155-158 - [c27]Jiyong Yu, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. SEED 2022: 133-144 - 2021
- [c26]Xinyang Ge, Ben Niu, Robert Brotzman, Yaohui Chen, HyungSeok Han, Patrice Godefroid, Weidong Cui:
HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs. CCS 2021: 366-378 - 2020
- [c25]Xinyang Ge, Ben Niu, Weidong Cui:
Reverse Debugging of Kernel Failures in Deployed Systems. USENIX ATC 2020: 281-292 - [i1]Ivan Evtimov, Weidong Cui, Ece Kamar, Emre Kiciman, Tadayoshi Kohno, Jerry Li:
Security and Machine Learning in the Real World. CoRR abs/2007.07205 (2020)
2010 – 2019
- 2018
- [c24]Qingyun Liu, Jack W. Stokes, Rob Mead, Tim Burrell, Ian Hellen, John Lambert, Andrey Marochko, Weidong Cui:
Latte: Large-Scale Lateral Movement Detection. MILCOM 2018: 1-6 - [c23]Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, Insu Yun:
REPT: Reverse Debugging of Failures in Deployed Software. OSDI 2018: 17-32 - 2017
- [c22]Xinyang Ge, Weidong Cui, Trent Jaeger:
GRIFFIN: Guarding Control Flows Using Intel Processor Trace. ASPLOS 2017: 585-598 - [c21]Baris Kasikci, Weidong Cui, Xinyang Ge, Ben Niu:
Lazy Diagnosis of In-Production Concurrency Bugs. SOSP 2017: 582-598 - [c20]Marcus Hähnel, Weidong Cui, Marcus Peinado:
High-Resolution Side Channels for Untrusted Operating Systems. USENIX ATC 2017: 299-312 - 2016
- [c19]Weidong Cui, Marcus Peinado, Sang Kil Cha, Yanick Fratantonio, Vasileios P. Kemerlis:
RETracer: triaging crashes by reverse execution from partial memory dumps. ICSE 2016: 820-831 - 2015
- [c18]Yuanzhong Xu, Weidong Cui, Marcus Peinado:
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems. IEEE Symposium on Security and Privacy 2015: 640-656 - 2013
- [c17]Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna:
deDacota: toward preventing server-side XSS via automatic code and data separation. CCS 2013: 1205-1216 - 2012
- [c16]Weidong Cui, Marcus Peinado, Zhilei Xu, Ellick Chan:
Tracking Rootkit Footprints with a Practical Memory Analysis System. USENIX Security Symposium 2012: 601-615 - 2011
- [c15]Christian Kreibich, Nicholas Weaver, Chris Kanich, Weidong Cui, Vern Paxson:
GQ: practical containment for measuring modern malware systems. Internet Measurement Conference 2011: 397-412
2000 – 2009
- 2009
- [c14]Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi:
Secure in-VM monitoring using hardware virtualization. CCS 2009: 477-487 - [c13]Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning:
Countering kernel rootkits with lightweight hook protection. CCS 2009: 545-554 - [c12]Martim Carbone, Weidong Cui, Long Lu, Wenke Lee, Marcus Peinado, Xuxian Jiang:
Mapping kernel objects to enable systematic integrity checking. CCS 2009: 555-565 - [c11]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace:
ReFormat: Automatic Reverse Engineering of Encrypted Messages. ESORICS 2009: 200-215 - 2008
- [c10]Weidong Cui, Marcus Peinado, Karl Chen, Helen J. Wang, Luis Irún-Briz:
Tupni: automatic reverse engineering of input formats. CCS 2008: 391-402 - [c9]Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang:
Countering Persistent Kernel Rootkits through Systematic Hook Discovery. RAID 2008: 21-38 - [c8]V. Benjamin Livshits, Weidong Cui:
Spectator: Detection and Containment of JavaScript Worms. USENIX ATC 2008: 335-348 - 2007
- [c7]Weidong Cui, Marcus Peinado, Helen J. Wang, Michael E. Locasto:
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing. S&P 2007: 252-266 - [c6]Weidong Cui, Jayanthkumar Kannan, Helen J. Wang:
Discoverer: Automatic Protocol Reverse Engineering from Network Traces. USENIX Security Symposium 2007 - 2006
- [c5]Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz:
Protocol-Independent Adaptive Replay of Application Dialog. NDSS 2006 - 2005
- [c4]Weidong Cui, Randy H. Katz, Wai-tian Tan:
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. ACSAC 2005: 361-370 - [c3]Weidong Cui, Randy H. Katz, Wai-tian Tan:
BINDER: An Extrusion-Based Break-In Detector for Personal Computers. USENIX ATC, General Track 2005: 363-366 - 2002
- [c2]Weidong Cui, Ion Stoica, Randy H. Katz:
Backup Path Allocation Based on a Correlated Link Failure Probability Model in Overlay Networks. ICNP 2002: 236 - [c1]Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, Ion Stoica:
The SAHARA Model for Service Composition across Multiple Providers. Pervasive 2002: 1-14
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-21 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint