Yu Ding
Yu Ding
ByteDance
Verified email at apache.org - Homepage
Title
Cited by
Cited by
Year
VTrust: Regaining Trust on Virtual Calls
C Zhang, S Carr, T Li, Y Ding, C Song, M Payer, D Song
The Network and Distributed System Security Symposium (NDSS'16) 2016, 2016
852016
Heap taichi: exploiting memory allocation granularity in heap-spraying attacks
Y Ding, T Wei, TL Wang, Z Liang, W Zou
Proceedings of the 26th Annual Computer Security Applications Conference …, 2010
532010
Towards Memory Safe Enclave Programming with Rust-SGX
H Wang, P Wang, Y Ding, M Sun, Y Jing, R Duan, L Li, Y Zhang, T Wei, ...
the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2333 …, 2019
352019
POSTER: Rust SGX SDK: Towards Memory Safety in Intel SGX Enclave
Y Ding, R Duan, L Li, Y Cheng, Y Zhang, T Chen, T Wei, H Wang
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
282017
Android Low Entropy Demystified
Y Ding, Z Peng, Y Zhou, C Zhang
IEEE International Conference on Communications (ICC), 2014
162014
A framework to eliminate backdoors from response-computable authentication
S Dai, T Wei, C Zhang, T Wang, Y Ding, Z Liang, W Zou
2012 IEEE Symposium on Security and Privacy, 3-17, 2012
152012
Accurate and Efficient Exploit Capture and Classification
Y Ding, T Wei, H Xue, Y Zhang, C Zhang, X Han
SCIENCE CHINA Information Sciences 60 (5), 2017
72017
Building and maintaining a third-party library supply chain for productive and secure SGX enclave development
P Wang, Y Ding, M Sun, H Wang, T Li, R Zhou, Z Chen, Y Jing
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
32020
Poster: Classifying Downloaders
Y Ding, L Guo, C Zhang, Y Zhang, H Xue, T Wei, Y Zhou, X Han
IEEE Symposium on Security and Privacy, 2015
3*2015
Poster: gbdt-rs: Fast and trustworthy gradient boosting decision tree
T Li, T Li, Y Ding, Y Zhang, T Wei, X Han
Posters In 2019 IEEE Symposium on Security and Privacy (SP), 2019
22019
SQL Injection Prevention Based on Sensitive Characters
Z Huilin, D Yu, Z Lihua, D Lei, Z Chao, W Tao, L Guancheng, H Xinhui
Journal of Computer Research and Development 53 (10), 2262, 2016
22016
基于敏感字符的SQL注入攻击防御方法
H Zhang, Y Ding, L Zhang, L Duan, C Zhang, T Wei, G Li, X Han
Journal of Computer Research and Development 53 (10), 2262-2276, 2016
2*2016
Poster: AdHoneyDroid: Capture Malicious Android Advertisements
D Wang, S Dai, Y Ding, T Li, X Han
21st ACM Conference on Computer and Communications Security (Poster), 2014
22014
Towards Memory Safe Python Enclave for Security Sensitive Computation
H Wang, M Sun, Q Feng, P Wang, T Li, Y Ding
arXiv preprint arXiv:2005.05996, 2020
12020
Token based secure multiparty computing framework using a restricted operating environment
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent 11,128,617, 2021
2021
Secure multiparty computing framework using a restricted operating environment with a guest agent
Y Cheng, Y Zhang, Y Ding, T Wei
US Patent App. 16/264,476, 2020
2020
Generic verification approach for Protobuf based projects
Q Feng, Y Zhang, P Wang, Y Ding, T Wei
US Patent 10,732,944, 2020
2020
Method, apparatus and system for device identification
Y Ding, T Wei, Y Zhang
US Patent 10,341,093, 2019
2019
基于分隔符的跨站脚本攻击防御方法
H Zhang, G Li, Y Ding, L Duan, X Han, J Xiao
Beijing Da Xue Xue Bao 54 (2), 320-330, 2018
2018
支付平台的安全漏洞分析
丁羽, 黎桐辛, 韦韬
中国教育网络, 46-50, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20