发表论文
[1] 陈磊, Shi Liu, 王晨曦, Haoran Ma, Yifan Qiao, 王喆, 武成岗, Youyou Lu, 冯晓兵, 崔慧敏, Harry Xu. A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications. 第18届USENIX操作系统设计与实现研讨会. 2024, [2] 许佳丽, 谢梦瑶, 武成岗, 张殷乾, 栗祺菁, 黄轩, 赖远明, 康妍, 王伟, 魏强, 王喆. PANIC: PAN-assisted Intra-process Memory Isolation on ARM. ACM Conference on Computer and Communications Security (CCS) (CCF A类). 2023, [3] 唐博文, 武成岗, Pen-Chung Yew, 张殷乾, 谢梦瑶, 赖远明, 康妍, 王伟, 王喆. SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (CCF A类)[J]. 2023, [4] 孙力立, 张培华, 武成岗, 王喆. JavaScript引擎JIT代码的类型混淆缺陷检测器. 高技术通讯. 2023, 33(3): 251-260, http://lib.cqvip.com/Qikan/Article/Detail?id=7109832057.[5] Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, 王喆, 武成岗. SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.. 2022 USENIX Annual Technical Conference.(USENIX ATC '22). (CCF A). 2022, [6] 谢梦瑶, 武成岗, 王喆, 张殷乾, 许佳丽, 赖远明, 康妍, 王伟. CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.. The 29th ACM Conference on Computer and Communications Security.(CCS 2022) (CCF A). 2022, [7] 孙力立, 武成岗, 许佳丽, 张培华, 唐博文, 谢梦瑶. 脚本语言执行引擎的模糊测试技术综述. 高技术通讯. 2022, 32(12): 1226-1235, http://lib.cqvip.com/Qikan/Article/Detail?id=7109182734.[8] 武成岗, 谢梦瑶, 王喆, 张殷乾, 卢康杰, 张晓峰, 赖远明, 康妍, 杨珉, 李涛. Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware.. IEEE Transactions on Dependable and Secure Computing (CCF A)[J]. 2022, [9] 唐博文, 武成岗, 王喆, 贾力陈, Pen-Chung Yew, Yueqiang Cheng, 张殷乾, 王晨曦, Harry Xu. SPECBOX: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.. IEEE Transactions on Dependable and Secure Computing (CCF A)[J]. 2022, [10] Zhou ShunFan, 杨哲慜, Dan Qiao, Peng Liu, 杨珉, 王喆, 武成岗. Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security 2022. (CCF A). 2022, [11] 王喆, 武成岗, Yinqian Zhang, 唐博文, yew penchung, 谢梦瑶, 赖远明, 康妍. Making Information Hiding Effective Again. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (CCF A)[J]. 2021, [12] 王喆, Wu, Chenggang, Xie, Mengyao, Zhang, Yinqian, Lu, Kangjie, Zhang, Xiaofeng, Lai, Yuanming, Kang, Yan, Yang, Min. SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020). 2020, 592-607, [13] 王喆, Wu Chenggang, Zhang Yinqian, Tang Bowen, Yew PenChung, Xie Mengyao, Lai Yuanming, Kang Yan, Cheng Yueqiang, Shi Zhiping. SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM. 2019, 1239-1256, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000071.[14] Wang, Zhe, Wu, Chenggang, Yuan, Xiang, Wang, Zhenjiang, Li, Jianjun, Yew, PenChung, Huang, Jeff, Feng, Xiaobing, Lan, Yanyan, Chen, Yunji, Lai, Yuanming, Guan, Yong. Using Local Clocks to Reproduce Concurrency Bugs. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (CCF A)[J]. 2018, 44(11): 1112-1128, https://www.webofscience.com/wos/woscc/full-record/WOS:000449964600006.[15] Xiao, Qixue, Chen, Yu, Wu, Chengang, Li, Kang, Mao, Junjie, Guo, Shize, Shi, Yuanchun, IEEE. pbSE: Phase-based Symbolic Execution. 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN). 2017, 133-144, [16] 武成岗. RERANZ:A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks. Virtual Execution Environments (CCF B类). 2017, [17] Liu Lei, Yang Hao, Li Yong, Xie Mengyao, Li Lian, Wu Chenggang, IEEE. Memos: A Full Hierarchy Hybrid Memory Management Framework. PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD). 2016, 368-371, [18] 武成岗, 李建军. 控制流完整性的发展历程. 中国教育网络[J]. 2016, 52-55, http://lib.cqvip.com/Qikan/Article/Detail?id=668512653.[19] 远翔, 武成岗, 王振江. 二进制翻译系统中信号处理机制的研究. 高技术通讯[J]. 2015, 543-551, http://lib.cqvip.com/Qikan/Article/Detail?id=666426461.[20] 远翔, 武成岗, 王振江, 李建军, Pen-Chung Yew, Jeff Huang, 冯晓兵, 兰艳艳, 陈云霁, 关永. Reproducing Concurrency Bugs Using Local Clocks. ACM/IEEE 37th International Conference on Software Engineering (ICSE 2015) (CCF A类).. 2015, [21] Wang, Zhe, Li, Jianjun, Wu, Chenggang, Yang, Dongyan, Wang, Zhenjiang, Hsu, WeiChung, Li, Bin, Guan, Yong. HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines. ACM SIGPLAN NOTICES. 2015, 50(7): 53-64, https://www.webofscience.com/wos/woscc/full-record/WOS:000361284300005.[22] Wu, Chenggang, Li, Jin, Xu, Di, Yew, PenChung, Li, Jianjun, Wang, Zhenjiang. FPS: A Fair-Progress Process Scheduling Policy on Shared-Memory Multiprocessors. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (CCF A)[J]. 2015, 26(2): 444-454, https://www.webofscience.com/wos/woscc/full-record/WOS:000349769300012.[23] Guo Hui, Wang Zhenjiang, Wu Chenggang, He Ruining, IEEE. EATBit: Effective Automated Test for Binary Translation with High Code Coverage. 2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE). 2014, [24] 王文文, 王振江, 武成岗, Pen-Chung Yew, Xipeng Shen, 远翔, 李建军, 冯晓兵, 关永. Localization of Concurrency Bugs Using Shared Memory Access. 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014) (CCF A类). 2014, [25] Wang, Wenwen, Wu, Chenggang, Yew, PenChung, Yuan, Xiang, Wang, Zhenjiang, Li, Jianjun, Feng, Xiaobing. Concurrency Bug Localization using Shared Memory Access Pairs. ACM SIGPLAN NOTICES[J]. 2014, 49(8): 375-376, https://www.webofscience.com/wos/woscc/full-record/WOS:000349142100035.[26] 王文文, 武成岗, 白童心, 王振江, 远翔, 崔慧敏. 二进制翻译中标志位的模式化翻译方法. 计算机研究与发展[J]. 2014, 51(10): 2336-2347, http://lib.cqvip.com/Qikan/Article/Detail?id=662435627.[27] 王文文, 武成岗, Paruj Ratanaworabhan, 远翔, 王振江, 李建军, 冯晓兵. 动态容忍和检测非对称数据竞争. 计算机研究与发展[J]. 2014, 51(8): 1748-1763, http://lib.cqvip.com/Qikan/Article/Detail?id=661863766.[28] 李建军, 王振江, 武成岗, Wei-Chung Hsu, 徐地. Dynamic and Adaptive Calling Context Encoding. INTERNATIONALSYMPOSIUMONCODEGENERATIONANDOPTIMIZATIONCGO. 2014, [29] Yuan Xiang, Wang Zhenjiang, Wu Chenggang, Yew PenChung, Wang Wenwen, Li Jianjun, Xu Di, Wolf F, Mohr B, Mey DA. Synchronization Identification through On-the-Fly Test. EURO-PAR 2013 PARALLEL PROCESSING. 2013, 8097: 4-15, [30] Wang, Zhenjiang, Wu, Chenggang, Yew, PenChung, Li, Jianjun, Xu, Di. On-the-Fly Structure Splitting for Heap Objects. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION (CCF B)[J]. 2012, 8(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000299995000009.[31] 贾耀仓, 武成岗, 张兆庆. 指导cache静态划分的程序性能profiling优化技术. 计算机研究与发展[J]. 2012, 49(1): 93-102, http://lib.cqvip.com/Qikan/Article/Detail?id=40786903.[32] 徐地, 武成岗, Pen-Chung Yew, 李建军, 王振江. Providing Fairness on Shared-Memory Multiprocessors via Process Scheduling. SIGMETRICS/Performance 2012 (CCF B类). 2012, [33] Li, Jianjun, Wu, Chenggang, Hsu, WeiChung. Efficient and Effective Misaligned Data Access Handling in a Dynamic Binary Translation System. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION (CCF B)[J]. 2011, 8(2): http://dx.doi.org/10.1145/1970386.1970388.[34] Li, Jianjun, Wu, Chenggang, Hsu, WeiChung, IEEE. Dynamic Register Promotion of Stack Variables. 2011 9TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO). 2011, 21-31, [35] 徐地, 武成岗, Pen-Chung Yew. On Mitigating Memory Bandwidth Contention through Bandwidth-Aware Scheduling. ACM International Conference on Parallel Architectures and Compilation Techniques (PACT ) (CCF B类). 2010, [36] 王振江, 武成岗, Yew, PenChung, ACM. On Improving Heap Memory Layout by Dynamic Pool Allocation. CGO 2010: THE EIGHTH INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, PROCEEDINGS. 2010, 92-+, [37] 李建军, 武成岗, Wei-Chung Hsu. An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems. CGO 2009: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, PROCEEDINGS. 2009, 180-+, [38] 谢海斌, 武成岗, 崔慧敏, 李晶. 二进制翻译中的X86浮点栈处理. 计算机研究与发展[J]. 2007, 44(11): 1946-1954, http://lib.cqvip.com/Qikan/Article/Detail?id=25904276.[39] 唐锋, 武成岗, 张兆庆, 杨浩. 二进制翻译应用级异常处理. 计算机研究与发展[J]. 2006, 43(12): 2166-2173, https://crad.ict.ac.cn/cn/article/id/2010.[40] 杨浩, 唐锋, 谢海斌, 武成岗, 冯晓兵. 二进制翻译中的库函数处理. 计算机研究与发展[J]. 2006, 43(12): 2174-2179, https://crad.ict.ac.cn/cn/article/id/2020.[41] 石学林, 张兆庆, 武成岗. Cobol到Java翻译中的数据类型转换方法. 计算机研究与发展[J]. 2006, 43(2): 336-342, http://lib.cqvip.com/Qikan/Article/Detail?id=21242002.[42] 马湘宁, 武成岗, 唐锋, 冯晓兵, 张兆庆. 二进制翻译中的标志位优化技术. 计算机研究与发展[J]. 2005, 42(2): 329-337, http://lib.cqvip.com/Qikan/Article/Detail?id=12076230.[43] 武成岗, 焦文品, 田启家, 史忠值. 基于主体论和多主体信息检索服务器. 计算机研究与发展[J]. 2001, 38(6): 641-647, http://lib.cqvip.com/Qikan/Article/Detail?id=5281719.[44] 武成岗, 刘少辉, 王博, 史忠值. Configurable Mobile Agent and Its Fault-tolerance Mechanism. International Conference on Computer Networks and Mobile Computing (ICCNMC). 2001, [45] 郭绍忠, 武成岗. 在PowerBuilder中读写Sybase的Image数据. 信息工程学院学报[J]. 1998, 17(4): 8-11, http://lib.cqvip.com/Qikan/Article/Detail?id=3327782.