Wenbo Shen

ORCID: 0000-0003-2899-6121
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Network Security and Intrusion Detection
  • Wireless Communication Security Techniques
  • Software System Performance and Reliability
  • Cloud Data Security Solutions
  • Antenna Design and Analysis
  • Security in Wireless Sensor Networks
  • Parallel Computing and Optimization Techniques
  • Embedded Systems Design Techniques
  • Digital and Cyber Forensics
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptographic Implementations and Security
  • Software Engineering Research
  • Adversarial Robustness in Machine Learning
  • Indoor and Outdoor Localization Technologies
  • Cooperative Communication and Network Coding
  • Structural Response to Dynamic Loads
  • Advanced oxidation water treatment
  • Cloud Computing and Resource Management
  • Radiation Effects in Electronics
  • Smart Grid Security and Resilience
  • Web Application Security Vulnerabilities
  • Advanced Data Storage Technologies

Zhejiang University
2019-2025

Central South University
2023-2024

Nanjing Institute of Environmental Sciences
2021-2024

Zhejiang University of Science and Technology
2020-2024

Ministry of Ecology and Environment
2021-2024

Zhejiang Lab
2023

Xijing University
2021

Hohai University
2021

Samsung (United States)
2016-2017

Research!America (United States)
2017

TrustZone-based Real-time Kernel Protection (TZ-RKP) is a novel system that provides real-time protection of the OS kernel using ARM TrustZone secure world. TZ-RKP more than current approaches use hypervisors to host tools. Although provide privilege and isolation, they face fundamental security challenges due their growing complexity code size. puts its monitor, which represents entire Trusted Computing Base (TCB), in world; safe isolated environment dedicated services. Hence, monitor from...

10.1145/2660267.2660350 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2014-11-03

Previous research on kernel monitoring and protection widely relies higher privileged system components, such as hardware virtualization extensions, to isolate security tools from potential attacks.These approaches increase both the maintenance effort code base size of which consequently increases risk having vulnerabilities.SKEE, stands for Secure Kernellevel Execution Environment, solves this fundamental problem.SKEE is a novel that provides an isolated lightweight execution environment at...

10.14722/ndss.2016.23009 article EN 2016-01-01

This paper presents a novel mechanism, called Ally Friendly Jamming, which aims at providing an intelligent jamming capability that can disable unauthorized (enemy) wireless communication but the same time still allow authorized devices to communicate, even if all these operate frequency. The basic idea is jam channel continuously properly control signals with secret keys, so are unpredictable interference devices, recoverable by ones equipped keys. To achieve ally friendly capability, we...

10.1109/sp.2013.22 article EN IEEE Symposium on Security and Privacy 2013-05-01

A fundamental assumption of link signature based security mechanisms is that the wireless signals received at two locations separated by more than half a wavelength are essentially uncorrelated. However, it has been observed in certain circumstances (e.g., with poor scattering and/or strong line-of-sight (LOS) component), this invalid. In paper, Correlation ATtack (CAT) proposed to demonstrate potential vulnerability such circumstances. Based on statistical inference, CAT explicitly exploits...

10.1109/infcom.2013.6566763 article EN 2013-04-01

Despite its effectiveness in uncovering software defects, American Fuzzy Lop (AFL), one of the best grey-box fuzzers, is inefficient when fuzz-testing source-unavailable programs. AFL's binary-only fuzzing mode, QEMU-AFL, typically 2-5× slower than source- available mode. The slowdown largely caused by heavy dynamic instrumentation. Recent techniques use Intel Processor Tracing (PT), a light-weight tracing feature supported recent CPUs, to re- move need However, we found that these PT-based...

10.1145/3321705.3329828 article EN 2019-07-02

Motivated by information-theoretic security, link signature (LS)-based security mechanisms exploit the ample channel characteristics between wireless devices for establishment. Nevertheless, LS is originated from environments and hence may exhibit potential vulnerabilities that can be exploited adversary in vicinity. As to this, it widely believed existing literature on that, a half-wavelength guard zone sufficient decorrelate legitimate one thereby secures LS. However, such an assumption...

10.1109/twc.2015.2498621 article EN publisher-specific-oa IEEE Transactions on Wireless Communications 2015-11-06

Code reuse attacks exploiting memory disclosure vulnerabilities can bypass all deployed mitigations. One promising defense against this class of is to enable execute-only (XOM) protection on top fine-grained address space layout randomization (ASLR). However, recent works implementing XOM, despite their efficacy, only protect programs that have been (re)built with new compiler support, leaving commercial-off-the-shelf (COTS) binaries and source-unavailable unprotected. We present the design...

10.1109/sp.2017.30 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2017-05-01

This paper presents a novel technique - Multi-Channel Ratio (MCR) Decoding, which aims at providing an anti-jamming wireless communication capability for multi-antenna devices. The basic idea of MCR decoding is to fully leverage the repeated preamble signals and multi-channel characteristics in MIMO communications detect recover desired transmission under constant reactive jamming attacks. also reports analysis, implementation, experimental evaluations on software-defined radio platform...

10.1109/cns.2014.6997478 article EN IEEE Conference on Communications and Network Security 2014-10-01

Link signature (LS) provides security to wireless devices by exploiting multipath characteristics, with an essential assumption that half-wavelength separation is sufficient prevent nearby adversary sensors from effectively inferring the legitimate LS. However, such may be too optimistic; high channel correlation has been observed in real world experiments even when spatial much larger than half-wavelength. In fact, varies for different environments. Considering this, various...

10.1109/cns.2014.6997473 article EN IEEE Conference on Communications and Network Security 2014-10-01

SEAndroid is a mandatory access control (MAC) framework that can confine faulty applications on Android. Nevertheless, the effectiveness of enforcement depends employed policy. The growing complexity Android makes it difficult for policy engineers to have complete domain knowledge every system functionality. As result, sometimes craft over-permissive and ineffective rules, which unfortunately increased attack surface allowed multiple real-world privilege escalation attacks. We propose SPOKE,...

10.1145/3052973.3052991 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2017-03-31

Although pesticide intermediates are a kind of typical toxic pollutant in contaminated sites, the remediation these contaminants groundwater and soils is limited concern. In present study we investigated performance novel heterogeneous oxidation system, biochar supported nanoscaled-zero valent iron (nZVI/BC) activated persulfate (PS), oxidative degradation nitrochlorobenzene (NCB), intermediate. Peanut shell based nZVI/BC was prepared used as PS activator. The kinetics m-, p-, o-NCB isomers...

10.3389/fchem.2021.615694 article EN cc-by Frontiers in Chemistry 2021-03-10

The widespread deployment of control-flow integrity has propelled non-control data attacks into the mainstream. In domain OS kernel exploits, by corrupting critical data, local attackers can directly gain root access or privilege escalation without hijacking control flow. As a result, kernels have been restricting availability such data. This forces to continue search for more exploitable in kernels. However, discovering unknown be daunting because they are often tied heavily semantics and...

10.48550/arxiv.2401.17618 preprint EN arXiv (Cornell University) 2024-01-31

In wireless networks, location distinction aims to detect changes or facilitate authentication of users. To achieve distinction, recent research has focused on investigating the spatial uncorrelation property channels. Specifically, differences in channel characteristics are used distinguish locations identify changes. However, we discover a new attack against all existing approaches that built such an attack, adversary can easily hide her impersonate movements by injecting fake into target...

10.1109/tmc.2016.2549519 article EN publisher-specific-oa IEEE Transactions on Mobile Computing 2016-03-31

Due to its faster start-up speed and better resource utilization efficiency, OS-level virtualization has been widely adopted become a fundamental technology in cloud computing. Compared hardware virtualization, leverages the shared-kernel design achieve high efficiency runs multiple user-space instances (a.k.a., containers) on shared kernel. However, this paper, we reveal new attack surface that is intrinsic affecting Linux, FreeBSD, Fuchsia. The root cause results containers sharing...

10.1145/3460120.3484744 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Growing demand for energy-efficient, high-performance systems has resulted in the growth of innovative heterogeneous computing system architectures that use FPGAs. FPGA-based enable designers to implement custom instruction streams executing on potentially thousands compute elements. Traditionally, FPGAs have been used as elements PCI devices; however, this does not allow be co-processors. This paper describes a architecture is based Intel® Xeon® platform which one or more FPGAs, acting...

10.1145/1508128.1508172 article EN 2009-02-22

In wireless networks, location distinction aims to detect changes or facilitate authentication of users. To achieve distinction, recent research has been focused on investigating the spatial uncorrelation property channels. Specifically, differences channel characteristics are used distinguish locations identify changes.

10.1145/2639108.2639117 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2014-09-05

In recent years, containerization has become a major trend in the cloud due to its high resource utilization efficiency and convenient DevOps support. However, complexity of container system also introduces attack surfaces. This paper aims summarize security challenges cloud. particular, we first divide whole into different layers according their functionalities, including kernel layer, orchestration layer. We then security-related technologies. After that, discuss for each Finally, present...

10.1109/tpsisa52974.2021.00016 article EN 2021-12-01

Hardware memory domain primitives, such as Intel MPK and ARM Memory Domain, have been used for efficient in-process isolation. However, they can only provide a limited number of domains (16 domains), which cannot satisfy the compelling need more isolated inside address space process. Existing solutions to virtualize are either intrusive (need modification existing hardware), or incur large performance overhead.

10.1145/3575693.3575735 article EN 2023-01-27

Ransomware has evolved from an economic nuisance to a national security threat nowadays, which poses significant risk users. To address this problem, we propose RansomTag, tag-based approach against crypto ransomware with fine-grained data recovery. Compared state-of-the-art SSD-based solutions, RansomTag makes progress in three aspects. First, it decouples the detection functionality firmware of SSD and integrates into lightweight hypervisor Type I. Thus, can leverage powerful computing...

10.1145/3576915.3616665 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

Rust programming language is gaining popularity rapidly in building reliable and secure systems due to its security guarantees outstanding performance. To provide extra functionalities, the compiler introduces unstable features (RUF) extend functionality, syntax, standard library support. However, these are may get removed, introducing compilation failures dependent packages. Even worse, their impacts propagate through transitive dependencies, causing large-scale whole ecosystem. Although...

10.1145/3597503.3623352 article EN 2024-02-06

Less attention was paid to the remediation of volatile organic compounds (VOCs) contaminated soil treated by thermal conduction heating (TCH) coupled with chemical oxidization. In this study, lab-scale experiments trichloroethylene (TCE)-contaminated TCH and persulfate (TCH + PS) were performed explore influences PS usage, temperature, reaction time, variation properties. TCE removed from soils using a temperature lower than boiling point, removal ratio reached 78.21% time 6h at 60 °C....

10.3390/agronomy14020348 article EN cc-by Agronomy 2024-02-08

It is essential to study the blast-induced vibration of cylindrical charge so as reduce ground level and protect surrounding environment. In this paper, Heelan model used generation propagation mechanisms blasting induced by single-hole charge. shows that superposition waves explosives in different positions causes increase peak particle velocity ( PPV) region along direction detonation waves. The vector VPPV) versus distance for stemming lengths SL) indicates linear attenuation between VPPV...

10.1177/10775463241234122 article EN Journal of Vibration and Control 2024-03-06

Core retail management functions include defining market areas and profiling customers. For tourism enterprises, are geographically dispersed with many customers residing beyond the immediate area surrounding attraction. Visualization analysis of these distributed significantly enhanced by capabilities Geographic Information System (GIS) technology help to support objectives. Unfortunately, businesses unable utilize GIS due its complexity expense. This study develops a decision tool for...

10.1080/10548408.2014.890153 article EN Journal of Travel & Tourism Marketing 2014-10-03
Coming Soon ...