Follow
Yu Ding
Yu Ding
Google DeepMind
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
VTrust: Regaining Trust on Virtual Calls
C Zhang, S Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium (NDSS'16) 2016, 2016
1012016
Towards Memory Safe Enclave Programming with Rust-SGX
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2333 …, 2019
932019
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
632010
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
422017
Android Low Entropy Demystified
Y Ding, Z Peng, Y Zhou, C Zhang
IEEE International Conference on Communications (ICC), 2014
192014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
172012
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
122020
Accurate and Efficient Exploit Capture and Classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
SCIENCE CHINA Information Sciences 60 (5), 2017
122017
Towards memory safe python enclave for security sensitive computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
52020
Poster: AdHoneyDroid: Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
21st ACM Conference on Computer and Communications Security (Poster), 2014
52014
SQL Injection Attack Defense Method Based on Sensitive Characters [J]
Z Huilin, D Yu, Z Lihua
Computer Research and Development 53 (10), 2262-2276, 2016
42016
Secure multiparty computing framework using a restricted operating environment with a guest agent
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent 11,159,322, 2021
32021
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
32019
基于敏感字符的SQL注入攻击防御方法
H Zhang, Y Ding, L Zhang, L Duan, C Zhang, T Wei, G Li, X Han
Journal of Computer Research and Development 53 (10), 2262-2276, 2016
3*2016
Generic verification approach for Protobuf based projects
Q Feng, Y Zhang, P Wang, Y Ding, T Wei
US Patent 10,732,944, 2020
12020
Poster: Classifying Downloaders
Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han
IEEE Symposium on Security and Privacy, 2015
12015
Broadly Enabling KLEE to Effortlessly Find Unrecoverable Errors in Rust
Y Zhang, P Li, Y Ding, L Wang, D Williams, N Meng
Proceedings of the 46th International Conference on Software Engineering, 2024
2024
PTStore: Lightweight Architectural Support for Page Table Isolation
W Tan, Y Li, J Wu, C Zhang, Y Chen, Y Ding
2023 60th ACM/IEEE Design Automation Conference (DAC), 2023
2023
Token based secure multiparty computing framework using a restricted operating environment
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent 11,128,617, 2021
2021
Method, apparatus and system for device identification
Y Ding, T Wei, Y Zhang
US Patent 10,341,093, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20