Follow
Jidong Xiao
Jidong Xiao
Assistant Professor of Computer Science, Boise State University
Verified email at boisestate.edu - Homepage
Title
Cited by
Cited by
Year
Security implications of memory deduplication in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2013
802013
A covert channel construction in a virtualized environment
J Xiao, Z Xu, H Huang, H Wang
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
392012
Kernel data attack is a realistic security threat
J Xiao, H Huang, H Wang
International Conference on Security and Privacy in Communication Systems …, 2015
232015
HyperLink: Virtual machine introspection and memory forensic analysis without kernel source code
J Xiao, L Lu, H Wang, X Zhu
2016 IEEE international conference on autonomic computing (ICAC), 127-136, 2016
162016
Contextualizing consensus protocols in blockchain: A short survey
G Bashar, G Hill, S Singha, P Marella, GG Dagher, J Xiao
2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019
102019
KShot: Live kernel patching with SMM and SGX
L Zhou, F Zhang, J Liao, Z Ning, J Xiao, K Leach, W Weimer, G Wang
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems …, 2020
72020
Nighthawk: Transparent system introspection from ring-3
L Zhou, J Xiao, K Leach, W Weimer, F Zhang, G Wang
European Symposium on Research in Computer Security, 217-238, 2019
72019
Shadow patching: Minimizing maintenance windows in a virtualized enterprise environment
D Le, J Xiao, H Huang, H Wang
10th International Conference on Network and Service Management (CNSM) and …, 2014
62014
COMS: customer oriented migration service
K Huang, X Gao, F Zhang, J Xiao
2017 IEEE 10th international conference on cloud computing (CLOUD), 692-695, 2017
52017
Hyperprobe: Towards virtual machine extrospection
J Xiao, L Lu, H Huang, H Wang
29th Large Installation System Administration Conference (LISA15), 1-12, 2015
52015
A coprocessor-based introspection framework via intel management engine
L Zhou, F Zhang, J Xiao, K Leach, W Weimer, X Ding, G Wang
IEEE Transactions on Dependable and Secure Computing 18 (4), 1920-1932, 2021
22021
CloudSkulk: A Nested Virtual Machine Based Rootkit and Its Detection
J Connelly, T Roberts, X Gao, J Xiao, H Wang, A Stavrou
2021 51st Annual IEEE/IFIP International Conference on Dependable Systems …, 2021
12021
Understanding the Security Implication of Aborting Live Migration
X Gao, J Xiao, H Wang, A Stavrou
IEEE Transactions on Cloud Computing, 2020
12020
Virtual Machine Extrospection: A Reverse Information Retrieval in Clouds
J Xiao, L Lu, H Huang, H Wang
IEEE Transactions on Cloud Computing 9 (1), 401-413, 2018
12018
A Study of the Multiple Sign-in Feature in Web Applications
M Albahar, X Gao, G Dagher, D Liu, F Zhang, J Xiao
International Conference on Security and Privacy in Communication Systems …, 2019
2019
Poster: TwinHype: A Novel Approach to Reduce Cloud Downtime
L Lu, X Gao, J Xiao
2016
Understanding and Leveraging Virtualization Technology for Computer Security
J Xiao
The College of William and Mary, 2016
2016
Defeating Kernel Driver Purifier
J Xiao, H Huang, H Wang
International Conference on Security and Privacy in Communication Systems …, 2015
2015
Selling Stuff That's Free: the Commercial Side of Free Software
J Xiao, A Wang, L Lu, T Chajed, H Huang, T Kim, H Wang, P Emelyanov, ...
2016 USENIX Annual Technical Conference (USENIX ATC 16), 649-662, 2015
2015
Yu, Xiaoyuan 46 Zhao, Zhilong 236 Zou, Xukai 46
AK Shrestha, S Singha, S Sural, S Sutton, S Tahiri, D Tipper, S Truex, ...
The system can't perform the operation now. Try again later.
Articles 1–20