Zongwei Zhou
Zongwei Zhou
Ph.D. Candidate of Electrical and Computer Engineering, Carnegie Mellon University
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
7242010
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
3102014
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
1532012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
International conference on trust and trustworthy computing, 159-178, 2012
912012
Dancing with giants: Wimpy kernels for on-demand isolated i/o
Z Zhou, M Yu, VD Gligor
2014 IEEE symposium on security and privacy, 308-323, 2014
652014
ShortMAC: Efficient Data-Plane Fault Localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
302012
Network fault localization with small TCB
X Zhang, Z Zhou, G Hasker, A Perrig, V Gligor
2011 19th IEEE International Conference on Network Protocols, 143-154, 2011
272011
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set
Z Zhou, Y Xue, J Liu, W Zhang, J Li
International Conference on Information and Communications Security, 201-215, 2007
252007
Trusted display on untrusted commodity platforms
M Yu, VD Gligor, Z Zhou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
242015
KISS:“Key It Simple and Secure” corporate key management
Z Zhou, J Han, YH Lin, A Perrig, V Gligor
International Conference on Trust and Trustworthy Computing, 1-18, 2013
232013
Using trustworthy host-based information in the network
B Parno, Z Zhou, A Perrig
Proceedings of the seventh ACM workshop on Scalable trusted computing, 33-44, 2012
16*2012
Security enhancement over ad-hoc AODV routing protocol
Z Zhou
Proceedings of the 4th IASTED Conference on Communication, Network, and …, 2007
62007
Don’t Talk to Zombies: Mitigating DDoS Attacks via Attestation
B Parno, Z Zhou, A Perrig
June, 2009
52009
Towards high-performance pattern matching on multi-core network processing platforms
Y Qi, Z Zhou, Y Wu, Y Xue, J Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
42010
Towards effective network algorithms on multi-core network processors
Y Qi, Z Zhou, B Yang, F He, Y Xue, J Li
Proceedings of the 4th ACM/IEEE Symposium on Architectures for Networking …, 2008
42008
Dancing with giants: Wimpy kernels for on-demand I/O isolation
Z Zhou, M Yu, VD Gligor
IEEE Security & Privacy 13 (2), 38-46, 2015
32015
Fast path session creation on network processors
B Xu, Y Qi, F He, Z Zhou, Y Xue, J Li
2008 The 28th International Conference on Distributed Computing Systems, 573-580, 2008
32008
Experimental investigation on MPEG-2 based video coding at 22 Mbps
L Hua, C Yong, Z Zhihe, Y Sile
IEEE transactions on consumer electronics 41 (3), 615-619, 1995
31995
On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms
Z Zhou
Carnegie Mellon University, 2014
22014
Architectures for Practical Client–Side Security
VD Gligor, J McCune, B Parno, A Perrig, A Vasudevan, Z Zhou
Trustworthy Computing 2010, 2010
12010
The system can't perform the operation now. Try again later.
Articles 1–20