Follow
Xueyang Wang
Xueyang Wang
Alibaba Group
Verified email at nyu.edu
Title
Cited by
Cited by
Year
The cybersecurity landscape in industrial control systems
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 1039-1057, 2016
3082016
Numchecker: Detecting kernel control-flow modifying rootkits by using hardware performance counters
X Wang, R Karri
2013 50th ACM/EDAC/IEEE Design Automation Conference (DAC), 1-7, 2013
1172013
Confirm: Detecting firmware modifications in embedded systems using hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri
2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 544-551, 2015
962015
Reusing Hardware Performance Counters to Detect and Identify Kernel Control-flow Modifying Rootkits
X Wang, R Karri
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2016
732016
BRAIN: BehavioR based Adaptive Intrusion detection in Networks: Using Hardware Performance Counters to detect DDoS Attacks
V Jyothi, X Wang, SK Addepalli, R Karri
The 29th International Conference on VLSI Design, 2016
552016
Hardware performance counter-based malware identification and detection with adaptive compressive sensing
X Wang, S Chai, M Isnardi, S Lim, R Karri
ACM Transactions on Architecture and Code Optimization (TACO) 13 (1), 1-23, 2016
522016
Malicious firmware detection with hardware performance counters
X Wang, C Konstantinou, M Maniatakos, R Karri, S Lee, P Robison, ...
IEEE Transactions on Multi-Scale Computing Systems 2 (3), 160-173, 2016
432016
Magic: Malicious aging in circuits/cores
N Karimi, AK Kanuparthi, X Wang, O Sinanoglu, R Karri
ACM Transactions on Architecture and Code Optimization (TACO) 12 (1), 1-25, 2015
412015
SIGDROP: Signature-based ROP detection using hardware performance counters
X Wang, J Backer
arXiv preprint arXiv:1609.02667, 2016
172016
Detecting kernel control-flow modifying rootkits
X Wang, R Karri
Network Science and Cybersecurity, 177-187, 2014
72014
Numchecker: A System Approach for Kernel Rootkit Detection
X Wang, X Guo
Black Hat Asia 2016, 2016
52016
The industrial control systems cyber security landscape
S McLaughlin, C Konstantinou, X Wang, L Davi, AR Sadeghi, ...
Proceedings of the IEEE 104 (5), 2016
32016
CSAW 2009 team report (Polytechnic Institute of NYU). CSAW Embedded System Challenge
R Guo, S Kannan, W Liu, X Wang
22011
Methodology of Assessing Information Leakage through Software-Accessible Telemetries
C Liu, M Kar, X Wang, N Chawla, N Roggel, B Yuce, JM Fung
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
12021
Two Sides of the Same Coin: Boons and Banes of Machine Learning in Hardware Security
W Liu, CH Chang, X Wang, C Liu, JM Fung, M Ebrahimabadi, N Karimi, ...
IEEE Journal on Emerging and Selected Topics in Circuits and Systems 11 (2 …, 2021
12021
HPC-based Malware Detectors Actually Work: Transition to Practice After a Decade of Research
C Konstantinou, X Wang, P Krishnamurthy, F Khorrami, M Maniatakos, ...
IEEE Design & Test, 2022
2022
OPAL: On-the-go Physical Attack Lab to Evaluate Power Side-channel Vulnerabilities on FPGAs
R Elnaggar, S Ray, M Sabbagh, B Yuce, T Wang, J Fung
2021 IEEE Physical Assurance and Inspection of Electronics (PAINE), 1-8, 2021
2021
Reusing Hardware Performance Counters for System Security
X Wang
http://search.proquest.com/docview/1776488413, 2016
2016
ConFirm
X Wang, C Konstantinou, M Maniatakos, R Karri
2015
The system can't perform the operation now. Try again later.
Articles 1–19