12 Publications
2017
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Wang, WenhaoWang, WenhaoChen, GuoxingChen, GuoxingPan, XiaoruiPan, XiaoruiZhang, YinqianZhang, YinqianWang, Xiao FengWang, XiaoFengBindschaedler, VincentBindschaedler, VincentTang, HaixuTang, HaixuGunter, Carl and Gunter, Carl A
Conference on Computer and Communications Security : proceedings of the ... conference on computer and communications security. ACM Conference on Computer and Communications Security, vol. 2017, pp. 2421-2434. | Journal Article
 
TO THE EDITOR.
Liu, FubingLi, JingWang, XiaobinZhang, QianshiZou, MingxiangWang, Bing and Lv, Guohua
Spine, vol. 42, (no. 24), pp. E1452, December 15, 2017. | Journal Article
2016
On the privacy risks of sharing clinical proteomics data.
Li, SujunLi, SujunBandeira, NunoBandeira, NunoWang, XiaofengWang, XiaofengTang, Haixu and Tang, Haixu
AMIA Joint Summits on Translational Science proceedings. AMIA Joint Summits on Translational Science, vol. 2016, pp. 122-131, 2016. | Journal Article
2015
Choosing blindly but wisely: differentially private solicitation of DNA datasets for disease marker discovery.
Zhao, YonganWang, XiaofengJiang, XiaoqianOhno-Machado, Lucila and Tang, Haixu
Journal of the American Medical Informatics Association : JAMIA, vol. 22, (no. 1), pp. 100-108, January 2015. | Journal Article
2010
Deterring voluntary trace disclosure in re-encryption mix-networks
Wang, Xiao FengGolle, PhilippeJakobsson, Markus and Tsow, Alex
ACM Transactions on Information and System Security, vol. 13, 2010. | Journal Article
 
Using Web-Referral Architectures to Mitigate Denial-of-Service Threats
Wang, Xiao Feng and Reiter, Michael K
IEEE Transactions on Dependable and Secure Computing, vol. 7, (no. 2), pp. 203-216, Apr-Jun 2010. | Journal Article
2009
Denial of service attacks and defenses in decentralized trust management
Li, JiangtaoLi, NinghuiWang, Xiao Feng and Yu, Ting
International Journal of Information Security, vol. 8, (no. 2), pp. 89-101, Apr 2009. | Journal Article
2008
A multi-layer framework for puzzle-based denial-of-service defense
Wang, Xiao Feng and Reiter, Michael K
International Journal of Information Security, vol. 7, (no. 4), pp. 243-263, Aug 2008. | Journal Article
 
Fast and Black-box Exploit Detection and Signature Generation for Commodity Software
Wang, Xiao FengLi, ZhuoweiChoi, Jong YXu, JunReiter, Michael K and Kil, Chongkyung
ACM Transactions on Information and System Security, vol. 12, (no. 2), 2008. | Journal Article
2006
Packet vaccine:black-box exploit detection and signature generation
Wang, Xiao FengLi, ZhuoweiXu, JunReiter, Michael KKil, Chongkyung and Choi, Jong Y
Conference on Computer and Communications Security: Proceedings of the 13th ACM conference on Computer and communications security; 30 Oct.-03 Nov. 2006. 2006. | Conference Proceeding
2004
Mitigating bandwidth-exhaustion attacks using congestion puzzles
Wang, Xiao Feng and Reiter, Michael K
Conference on Computer and Communications Security: Proceedings of the 11th ACM conference on Computer and communications security; 25-29 Oct. 2004. 2004. | Conference Proceeding
 
Multiagent coordination under untrusted and uncertain environments (Dissertation)
Wang, Xiao Feng (2004).