发表

2025

  1. unicontainer-architecture.png
    Unicontainer: Unlocking the Potential of Unikernel for Secure and Efficient Containerization
    Container Virtualization
    Z. Zhang , Q. ZhouS. Xu , N. Jiang , W. Zhang , and X. Jia
    ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS 2025)
  2. chameleon-architecture.png
    Chameleon: Towards Building Least-privileged TEE via Functionality-based Resource Re-grouping
    TEE Mobile
    N. Jiang , Q. Zhou , F. Qian , J. Chen , H. Huang , X. Jia , and H. Du
    The 23rd ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2025)
  3. rcontainer-architecture.png
    RContainer: A Secure Container Architecture through Extending ARM CCA Hardware Primitives
    TEE Container CCA
    Q. Zhou , W. Cao , X. JiaP. LiuS. Zhang , J. Chen , S. Xu , and Z. Song
    Network and Distributed System Security (NDSS) Symposium 2025
  4. autoar-architecture.png
    Silence False Alarms: Identifying Anti-Reentrancy Patterns on Ethereum to Refine Smart Contract Reentrancy Detection
    AI
    Q. Song , H. Huang , X. Jia , Y. Xie , and J. Cao
    Network and Distributed System Security (NDSS) Symposium 2025

2024

  1. cubevisor-architecture.png
    CubeVisor: A Multi-realm Architecture Design for Running VM with ARM CCA
    TEE CCA Virtualization
    J. Chen , Q. Zhou , X. Yan , N. Jiang , X. Jia , and W. Zhang
    Proceedings of the 40th Annual Computer Security Applications Conference (ACSAC 2024)
  2. cipo-architecture.png
    CIPO: Efficient, lightweight and programmable packet scheduling
    Network
    F. Guo , S. Sun , J. Hu , N. Zhang , and Z. Lv
    Computer Networks, Volume 245, May 2024
  3. conmonitor-architecture.png
    ConMonitor: Lightweight Container Protection with Virtualization and VM Functions
    Container Virtualization
    S. XuQ. Zhou , Z. Zhang , X. Jia , D. Liu , H. Huang , H. Du , and Z. Song
    Proceedings of the 2024 ACM Symposium on Cloud Computing (SoCC ’24)
  4. hclave-architecture.png
    HClave: An isolated execution environment design for hypervisor runtime security
    Virtualization
    Q. Zhou , W. Cao , X. JiaS. Zhang , J. Chen , N. Jiang , W. Zhang , H. Du , Z. Song , and Q. Huang
    Computers & Security, Volume 144, 2024
  5. sedspec-architecture.png
    SEDSpec: Securing Emulated Devices by Enforcing Execution Specification
    Virtualization
    Y. Chen , S. Zhang , J. Xiaoqi , Q. Zhou , H. Huang , S. Xu , and H. Du
    The 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2024)
  6. sechannel-architecture.png
    SeChannel: A Secure and Lightweight Channel Protection Approach for TEE Systems
    TEE
    N. Jiang , Y. Zhao , Q. ZhouX. Jia , and J. Tang
    23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024)
  7. usb-catcher-architecture.png
    USB Catcher: Detection of Controlled Emissions via Conducted Compromising Emanations
    USB
    Y. Zhang , F. Du , X. Chi , and Z. Lv
    23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2024)
  8. summslim-architecture.png
    SummSlim: A Universal and Automated Approach for Debloating Container Images
    Container
    Z. Zhang , H. Huang , S. XuQ. Zhou , T. Zhang , X. Jia , and W. Zhang
    30th International Conference on Parallel and Distributed Systems (ICPADS 2024)
  9. attack-high-speed-usb-architecture.png
    A Conducted Compromising Emanations Method on High-Speed USB Devices via USB Hubs
    USB
    Y. Zhang , H. Li , Q. Ye , J. Hu , Y. Han , and Z. Lv
    2024 IEEE Symposium on Computers and Communications (ISCC)
  10. vasp-architecture.png
    vASP: Full VM Life-cycle Protection Based on Active Security Processor Architecture
    Virtualization
    J. Chen , Q. ZhouW. Zhang , N. Jiang , Y. Xie , and X. Jia
    24th International Symposium on Cluster, Cloud and Internet Computing (CCGrid 2024)
  11. lightarmor-architecture.png
    LightArmor: A Lightweight Trusted Operating System Isolation Approach for Mobile Systems
    TEE Mobile
    N. Jiang , Q. ZhouX. Jia , J. Chen , Q. Huang , and H. Du
    39th IFIP International Information Security Conference (IFIPSEC 2024)

2023

  1. log2policy-architecture.png
    Log2Policy: An Approach to Generate Fine-Grained Access Control Rules for Microservices from Scratch
    AI Cloud
    S. XuQ. Zhou , H. Huang , X. Jia , H. Du , Y. Chen , and Y. Xie
    Proceedings of the 39th Annual Computer Security Applications Conference (ACSAC 2023)

2022

  1. secfortress-architecture.png
    SecFortress: Securing Hypervisor using Cross-layer Isolation
    Virtualization
    Q. ZhouX. JiaS. Zhang , N. Jiang , J. Chen , and W. Zhang
    39th IEEE International Parallel & Distributed Processing Symposium (IPDPS 2022)

2020

  1. seef-aldr-architecture.png
    SEEF-ALDR: A Speaker Embedding Enhancement Framework via Adversarial Learning based Disentangled Representation
    AI
    J. Tai , X. Jia , Q. Huang , W. Zhang , H. Du , and S. Zhang
    Proceedings of the 36th Annual Computer Security Applications Conference
  2. et-gan-architecture.png
    ET-GAN: Cross-Language Emotion Transfer Based on Cycle-Consistent Generative Adversarial Networks
    AI
    X. Jia , J. Tai , Z. Hang , Y. Li , W. Zhang , H. Du , and Q. Huang
    The 24th European Conference on Artificial Intelligence (ECAI 2020)
  3. enclavepdp-architecture.png
    EnclavePDP: A General Framework to Verify Data Integrity in Cloud Using Intel SGX
    Virtualization TEE SGX
    Y. He , Y. Xu , X. JiaS. ZhangP. Liu , and S. Chang
    The 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)