Jun Jiang
Jun Jiang
Two Sigma Investments, LP
Verified email at
Cited by
Cited by
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
X Lou, T Zhang, J Jiang, Y Zhang
ACM Computing Surveys (CSUR) 54 (6), 1-37, 2021
HyperCrop: a hypervisor-based countermeasure for return oriented programming
J Jiang, X Jia, D Feng, S Zhang, P Liu
International Conference of Information and Communications Security, 360-373, 2011
Defending return-oriented programming based on virtualization techniques
X Jia, R Wang, J Jiang, S Zhang, P Liu
Security and Communication Networks 6 (10), 1236-1249, 2013
Characterizing Scientific Reporting in Security Literature: An analysis of ACM CCS and IEEE S&P Papers
M Burcham, M Al-Zyoud, JC Carver, M Alsaleh, H Du, F Gilani, J Jiang, ...
Proceedings of the Hot Topics in Science of Security: Symposium and Bootcamp …, 2017
Vccbox: Practical confinement of untrusted software in virtual cloud computing
J Jiang, M Nie, P Su, D Feng
International Conference on Security and Privacy in Communication Systems …, 2013
The system can't perform the operation now. Try again later.
Articles 1–5