发表论文
[1] 陈磊, Shi Liu, 王晨曦, Haoran Ma, Yifan Qiao, 王喆, 武成岗, Youyou Lu, 冯晓兵, 崔慧敏, Harry Xu. A Tale of Two Paths: Toward a Hybrid Data Plane for Efficient Far-Memory Applications. 第18届USENIX操作系统设计与实现研讨会. 2024, 第 7 作者null(null): [2] 张培华, 武成岗, 孟祥宇, 张殷乾, 彭明番, 张诗杨, 胡冰, 赖远明, 康妍, 王喆. Hive: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64. USENIX Security(CCF A类). 2024, 第 2 作者null(null): [3] 王继铭, 武成岗, 胡宇浩, 孙越, 任骥恺, 赖远明, 谢梦瑶, 张超, 李涛, 王喆. OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers. USENIX Security(CCF A类). 2024, 第 2 作者null(null): [4] 许佳丽, 谢梦瑶, 武成岗, 张殷乾, 栗祺菁, 黄轩, 赖远明, 康妍, 王伟, 魏强, 王喆. PANIC: PAN-assisted Intra-process Memory Isolation on ARM. ACM Conference on Computer and Communications Security (CCS) (CCF A类). 2023, 第 3 作者[5] 唐博文, 武成岗, Pen-Chung Yew, 张殷乾, 谢梦瑶, 赖远明, 康妍, 王伟, 王喆. SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS (CCF A类)[J]. 2023, 第 2 作者[6] 孙力立, 张培华, 武成岗, 王喆. JavaScript引擎JIT代码的类型混淆缺陷检测器. 高技术通讯. 2023, 第 3 作者33(3): 251-260, http://lib.cqvip.com/Qikan/Article/Detail?id=7109832057.[7] Tang, Bowen, Wu, Chenggang, Wang, Zhe, Jia, Lichen, Yew, PenChung, Cheng, Yueqiang, Zhang, Yinqian, Wang, Chenxi, Xu, Guoqing Harry. SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 2 作者20(1): 827-840, http://dx.doi.org/10.1109/TDSC.2022.3144287.[8] Wu, Chenggang, Xie, Mengyao, Wang, Zhe, Zhang, Yinqian, Lu, Kangjie, Zhang, Xiaofeng, Lai, Yuanming, Kang, Yan, Yang, Min, Li, Tao. Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2023, 第 1 作者20(3): 1959-1978, http://dx.doi.org/10.1109/TDSC.2022.3168089.[9] Zhi Zhang, Yueqiang Cheng, Minghua Wang, Wei He, Wenhao Wang, Surya Nepal, Yansong Gao, Kang Li, 王喆, 武成岗. SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh.. 2022 USENIX Annual Technical Conference.(USENIX ATC '22). (CCF A). 2022, 第 10 作者[10] 谢梦瑶, 武成岗, 王喆, 张殷乾, 许佳丽, 赖远明, 康妍, 王伟. CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.. The 29th ACM Conference on Computer and Communications Security.(CCS 2022) (CCF A). 2022, 第 2 作者[11] 孙力立, 武成岗, 许佳丽, 张培华, 唐博文, 谢梦瑶. 脚本语言执行引擎的模糊测试技术综述. 高技术通讯. 2022, 第 2 作者32(12): 1226-1235, http://lib.cqvip.com/Qikan/Article/Detail?id=7109182734.[12] 武成岗, 谢梦瑶, 王喆, 张殷乾, 卢康杰, 张晓峰, 赖远明, 康妍, 杨珉, 李涛. Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware.. IEEE Transactions on Dependable and Secure Computing (CCF A)[J]. 2022, 第 1 作者[13] 唐博文, 武成岗, 王喆, 贾力陈, Pen-Chung Yew, Yueqiang Cheng, 张殷乾, 王晨曦, Harry Xu. SPECBOX: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.. IEEE Transactions on Dependable and Secure Computing (CCF A)[J]. 2022, 第 2 作者[14] Zhou ShunFan, 杨哲慜, Dan Qiao, Peng Liu, 杨珉, 王喆, 武成岗. Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program Paths. USENIX Security 2022. (CCF A). 2022, 第 7 作者[15] Wang, Zhe, Wu, Chenggang, Zhang, Yinqian, Tang, Bowen, Yew, PenChung, Xie, Mengyao, Lai, Yuanming, Kang, Yan, Cheng, Yueqiang, Shi, Zhiping. Making Information Hiding Effective Again. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING[J]. 2022, 第 2 作者 通讯作者 19(4): 2576-2594, http://dx.doi.org/10.1109/TDSC.2021.3064086.[16] 王喆, 武成岗, Yinqian Zhang, 唐博文, yew penchung, 谢梦瑶, 赖远明, 康妍. Making Information Hiding Effective Again. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (CCF A)[J]. 2021, 第 2 作者 通讯作者 [17] 王喆, Wu, Chenggang, Xie, Mengyao, Zhang, Yinqian, Lu, Kangjie, Zhang, Xiaofeng, Lai, Yuanming, Kang, Yan, Yang, Min. SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. 2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020). 2020, 第 2 作者 通讯作者 592-607, [18] 王喆, Wu Chenggang, Zhang Yinqian, Tang Bowen, Yew PenChung, Xie Mengyao, Lai Yuanming, Kang Yan, Cheng Yueqiang, Shi Zhiping. SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM. 2019, 第 2 作者 通讯作者 1239-1256, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000509775000071.[19] Wang, Zhe, Wu, Chenggang, Yuan, Xiang, Wang, Zhenjiang, Li, Jianjun, Yew, PenChung, Huang, Jeff, Feng, Xiaobing, Lan, Yanyan, Chen, Yunji, Lai, Yuanming, Guan, Yong. Using Local Clocks to Reproduce Concurrency Bugs. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING (CCF A)[J]. 2018, 第 2 作者 通讯作者 44(11): 1112-1128, https://www.webofscience.com/wos/woscc/full-record/WOS:000449964600006.[20] Xiao, Qixue, Chen, Yu, Wu, Chengang, Li, Kang, Mao, Junjie, Guo, Shize, Shi, Yuanchun, IEEE. pbSE: Phase-based Symbolic Execution. 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN). 2017, 133-144, [21] 武成岗. RERANZ:A Light-Weight Virtual Machine to Mitigate Memory Disclosure Attacks. Virtual Execution Environments (CCF B类). 2017, 第 1 作者 通讯作者 [22] Liu Lei, Yang Hao, Li Yong, Xie Mengyao, Li Lian, Wu Chenggang, IEEE. Memos: A Full Hierarchy Hybrid Memory Management Framework. PROCEEDINGS OF THE 34TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER DESIGN (ICCD). 2016, 第 6 作者368-371, [23] 武成岗, 李建军. 控制流完整性的发展历程. 中国教育网络[J]. 2016, 第 1 作者52-55, http://lib.cqvip.com/Qikan/Article/Detail?id=668512653.[24] 远翔, 武成岗, 王振江. 二进制翻译系统中信号处理机制的研究. 高技术通讯[J]. 2015, 第 2 作者543-551, http://lib.cqvip.com/Qikan/Article/Detail?id=666426461.[25] 远翔, 武成岗, 王振江, 李建军, Pen-Chung Yew, Jeff Huang, 冯晓兵, 兰艳艳, 陈云霁, 关永. Reproducing Concurrency Bugs Using Local Clocks. ACM/IEEE 37th International Conference on Software Engineering (ICSE 2015) (CCF A类).. 2015, 第 2 作者 通讯作者 [26] Wang, Zhe, Li, Jianjun, Wu, Chenggang, Yang, Dongyan, Wang, Zhenjiang, Hsu, WeiChung, Li, Bin, Guan, Yong. HSPT: Practical Implementation and Efficient Management of Embedded Shadow Page Tables for Cross-ISA System Virtual Machines. ACM SIGPLAN NOTICES. 2015, 第 3 作者 通讯作者 50(7): 53-64, https://www.webofscience.com/wos/woscc/full-record/WOS:000361284300005.[27] Wu, Chenggang, Li, Jin, Xu, Di, Yew, PenChung, Li, Jianjun, Wang, Zhenjiang. FPS: A Fair-Progress Process Scheduling Policy on Shared-Memory Multiprocessors. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (CCF A)[J]. 2015, 第 1 作者 通讯作者 26(2): 444-454, https://www.webofscience.com/wos/woscc/full-record/WOS:000349769300012.[28] Guo Hui, Wang Zhenjiang, Wu Chenggang, He Ruining, IEEE. EATBit: Effective Automated Test for Binary Translation with High Code Coverage. 2014 DESIGN, AUTOMATION AND TEST IN EUROPE CONFERENCE AND EXHIBITION (DATE). 2014, 第 3 作者 通讯作者 [29] 王文文, 王振江, 武成岗, Pen-Chung Yew, Xipeng Shen, 远翔, 李建军, 冯晓兵, 关永. Localization of Concurrency Bugs Using Shared Memory Access. 29th IEEE/ACM International Conference on Automated Software Engineering (ASE 2014) (CCF A类). 2014, 第 3 作者 通讯作者 [30] Wang, Wenwen, Wu, Chenggang, Yew, PenChung, Yuan, Xiang, Wang, Zhenjiang, Li, Jianjun, Feng, Xiaobing. Concurrency Bug Localization using Shared Memory Access Pairs. ACM SIGPLAN NOTICES[J]. 2014, 第 2 作者49(8): 375-376, https://www.webofscience.com/wos/woscc/full-record/WOS:000349142100035.[31] 王文文, 武成岗, 白童心, 王振江, 远翔, 崔慧敏. 二进制翻译中标志位的模式化翻译方法. 计算机研究与发展[J]. 2014, 第 2 作者51(10): 2336-2347, http://lib.cqvip.com/Qikan/Article/Detail?id=662435627.[32] 王文文, 武成岗, Paruj Ratanaworabhan, 远翔, 王振江, 李建军, 冯晓兵. 动态容忍和检测非对称数据竞争. 计算机研究与发展[J]. 2014, 第 2 作者51(8): 1748-1763, http://lib.cqvip.com/Qikan/Article/Detail?id=661863766.[33] 李建军, 王振江, 武成岗, Wei-Chung Hsu, 徐地. Dynamic and Adaptive Calling Context Encoding. INTERNATIONALSYMPOSIUMONCODEGENERATIONANDOPTIMIZATIONCGO. 2014, 第 3 作者 通讯作者 [34] Yuan Xiang, Wang Zhenjiang, Wu Chenggang, Yew PenChung, Wang Wenwen, Li Jianjun, Xu Di, Wolf F, Mohr B, Mey DA. Synchronization Identification through On-the-Fly Test. EURO-PAR 2013 PARALLEL PROCESSING. 2013, 第 3 作者 通讯作者 8097: 4-15, [35] Wang, Zhenjiang, Wu, Chenggang, Yew, PenChung, Li, Jianjun, Xu, Di. On-the-Fly Structure Splitting for Heap Objects. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION (CCF B)[J]. 2012, 第 2 作者 通讯作者 8(4): https://www.webofscience.com/wos/woscc/full-record/WOS:000299995000009.[36] 贾耀仓, 武成岗, 张兆庆. 指导cache静态划分的程序性能profiling优化技术. 计算机研究与发展[J]. 2012, 第 2 作者49(1): 93-102, http://lib.cqvip.com/Qikan/Article/Detail?id=40786903.[37] 徐地, 武成岗, Pen-Chung Yew, 李建军, 王振江. Providing Fairness on Shared-Memory Multiprocessors via Process Scheduling. SIGMETRICS/Performance 2012 (CCF B类). 2012, 第 2 作者 通讯作者 [38] Li, Jianjun, Wu, Chenggang, Hsu, WeiChung. Efficient and Effective Misaligned Data Access Handling in a Dynamic Binary Translation System. ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION (CCF B)[J]. 2011, 第 2 作者 通讯作者 8(2): http://dx.doi.org/10.1145/1970386.1970388.[39] Li, Jianjun, Wu, Chenggang, Hsu, WeiChung, IEEE. Dynamic Register Promotion of Stack Variables. 2011 9TH ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION (CGO). 2011, 第 2 作者21-31, [40] 徐地, 武成岗, Pen-Chung Yew. On Mitigating Memory Bandwidth Contention through Bandwidth-Aware Scheduling. ACM International Conference on Parallel Architectures and Compilation Techniques (PACT ) (CCF B类). 2010, 第 2 作者 通讯作者 [41] 王振江, 武成岗, Yew, PenChung, ACM. On Improving Heap Memory Layout by Dynamic Pool Allocation. CGO 2010: THE EIGHTH INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, PROCEEDINGS. 2010, 第 2 作者 通讯作者 92-+, [42] 李建军, 武成岗, Wei-Chung Hsu. An Evaluation of Misaligned Data Access Handling Mechanisms in Dynamic Binary Translation Systems. CGO 2009: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, PROCEEDINGS. 2009, 第 2 作者 通讯作者 180-+, [43] 苏灵燕, 武成岗, 唐生林, 吴曾. COBOL到Java源代码翻译中的数据类型转换. 计算机应用研究[J]. 2008, 第 2 作者25(3): 771-774, http://lib.cqvip.com/Qikan/Article/Detail?id=26713742.[44] 谢海斌, 武成岗, 崔慧敏, 李晶. 二进制翻译中的X86浮点栈处理. 计算机研究与发展[J]. 2007, 第 2 作者44(11): 1946-1954, http://lib.cqvip.com/Qikan/Article/Detail?id=25904276.[45] 唐锋, 武成岗, 张兆庆, 杨浩. 二进制翻译应用级异常处理. 计算机研究与发展[J]. 2006, 第 2 作者43(12): 2166-2173, https://crad.ict.ac.cn/cn/article/id/2010.[46] 杨浩, 唐锋, 谢海斌, 武成岗, 冯晓兵. 二进制翻译中的库函数处理. 计算机研究与发展[J]. 2006, 第 4 作者43(12): 2174-2179, https://crad.ict.ac.cn/cn/article/id/2020.[47] 石学林, 张兆庆, 武成岗. Cobol到Java翻译中的数据类型转换方法. 计算机研究与发展[J]. 2006, 第 3 作者43(2): 336-342, http://lib.cqvip.com/Qikan/Article/Detail?id=21242002.[48] 马湘宁, 武成岗, 唐锋, 冯晓兵, 张兆庆. 二进制翻译中的标志位优化技术. 计算机研究与发展[J]. 2005, 第 2 作者42(2): 329-337, http://lib.cqvip.com/Qikan/Article/Detail?id=12076230.[49] 武成岗, 焦文品, 田启家, 史忠值. 基于主体论和多主体信息检索服务器. 计算机研究与发展[J]. 2001, 第 1 作者38(6): 641-647, http://lib.cqvip.com/Qikan/Article/Detail?id=5281719.[50] 武成岗, 刘少辉, 王博, 史忠值. Configurable Mobile Agent and Its Fault-tolerance Mechanism. International Conference on Computer Networks and Mobile Computing (ICCNMC). 2001, 第 1 作者[51] 史忠植, 武成岗, 田启家, 焦文品. 基于本体论和多主体的信息检索服务器. 计算机研究与发展. 2001, 第 2 作者38(6): 641, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=657182&detailType=1.[52] 郭绍忠, 武成岗. 在PowerBuilder中读写Sybase的Image数据. 信息工程学院学报[J]. 1998, 第 2 作者17(4): 8-11, http://lib.cqvip.com/Qikan/Article/Detail?id=3327782.