XiaoFeng Wang

XiaoFeng Wang

Indiana University Bloomington

H-index: 64

North America-United States

About XiaoFeng Wang

XiaoFeng Wang, With an exceptional h-index of 64 and a recent h-index of 50 (since 2020), a distinguished researcher at Indiana University Bloomington, specializes in the field of Data-Centric Security, System Security and Privacy, Incentive Engineering.

His recent articles reflect a diverse array of research interests and contributions to the field:

NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs

Gradient shaping: Enhancing backdoor attack against reverse engineering

Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation

Credit karma: Understanding security implications of exposed cloud services through automated capability inference

The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning

HE-Booster: an efficient polynomial arithmetic acceleration on GPUs for fully homomorphic encryption

Union under duress: understanding hazards of duplicate resource mismediation in android software supply chain

AutoPwn: Artifact-assisted Heap Exploit Generation for CTF PWN Competitions

XiaoFeng Wang Information

University

Position

James H. Rudy Professor of Computer Science

Citations(all)

15636

Citations(since 2020)

9096

Cited By

9952

hIndex(all)

64

hIndex(since 2020)

50

i10Index(all)

153

i10Index(since 2020)

124

Email

University Profile Page

Indiana University Bloomington

Google Scholar

View Google Scholar Profile

XiaoFeng Wang Skills & Research Interests

Data-Centric Security

System Security and Privacy

Incentive Engineering

Top articles of XiaoFeng Wang

Title

Journal

Author(s)

Publication Date

NestedSGX: Bootstrapping Trust to Enclaves within Confidential VMs

arXiv preprint arXiv:2402.11438

Wenhao Wang

Linke Song

Benshan Mei

Shuang Liu

Shijun Zhao

...

2024/2/18

Gradient shaping: Enhancing backdoor attack against reverse engineering

arXiv preprint arXiv:2301.12318

Rui Zhu

Di Tang

Siyuan Tang

Guanhong Tao

Shiqing Ma

...

2023/1/29

Lost along the Way: Understanding and Mitigating Path-Misresolution Threats to Container Isolation

Zhi Li

Weijie Liu

XiaoFeng Wang

Bin Yuan

Hongliang Tian

...

2023/11/15

Credit karma: Understanding security implications of exposed cloud services through automated capability inference

Xueqiang Wang

Yuqiong Sun

Susanta Nanda

XiaoFeng Wang

2023

The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning

Zihao Wang

Jiale Guan

XiaoFeng Wang

Wenhao Wang

Luyi Xing

...

2023/11/15

HE-Booster: an efficient polynomial arithmetic acceleration on GPUs for fully homomorphic encryption

IEEE Transactions on Parallel and Distributed Systems

Zhiwei Wang

Peinan Li

Rui Hou

Zhihao Li

Jiangfeng Cao

...

2023/1/9

Union under duress: understanding hazards of duplicate resource mismediation in android software supply chain

Xueqiang Wang

Yifan Zhang

XiaoFeng Wang

Yan Jia

Luyi Xing

2023

AutoPwn: Artifact-assisted Heap Exploit Generation for CTF PWN Competitions

IEEE Transactions on Information Forensics and Security

Dandan Xu

Kai Chen

Miaoqian Lin

Chaoyang Lin

Xiaofeng Wang

2023/10/5

Are You Spying on Me?{Large-Scale} Analysis on {IoT} Data Exposure through Companion Apps

Yuhong Nan

Xueqiang Wang

Luyi Xing

Xiaojing Liao

Ruoyu Wu

...

2023

Sherlock on Specs: Building {LTE} Conformance Tests through Automated Reasoning

Yi Chen

Di Tang

Yepeng Yao

Mingming Zha

XiaoFeng Wang

...

2023

Understanding the Security Risks of Decentralized Exchanges by Uncovering Unfair Trades in the Wild

Jiaqi Chen

Yibo Wang

Yuxuan Zhou

Wanning Ding

Yuzhe Tang

...

2023/7/3

{XCheck}: Verifying Integrity of 3D Printed {Patient-Specific} Devices via Computing Tomography

Zhiyuan Yu

Yuanhaur Chang

Shixuan Zhai

Nicholas Deily

Tao Ju

...

2023

Selective amnesia: On efficient, high-fidelity and blind suppression of backdoor effects in trojaned machine learning models

Rui Zhu

Di Tang

Siyuan Tang

XiaoFeng Wang

Haixu Tang

2023/5/21

A verified confidential computing as a service framework for privacy preservation

Hongbo Chen

Haobin Hiroki Chen

Mingshen Sun

Kang Li

Zhaofeng Chen

...

2023

Hazard Integrated: Understanding Security Risks in App Extensions to Team Chat Systems.

Mingming Zha

Jice Wang

Yuhong Nan

Xiaofeng Wang

Yuqing Zhang

...

2022

Order-disorder: Imitation adversarial attacks for black-box neural ranking models

Jiawei Liu

Yangyang Kang

Di Tang

Kaisong Song

Changlong Sun

...

2022/11/7

Seeing the forest for the trees: Understanding security hazards in the {3GPP} ecosystem through intelligent analysis on change requests

Yi Chen

Di Tang

Yepeng Yao

Mingming Zha

XiaoFeng Wang

...

2022

Clues in tweets: Twitter-guided discovery and analysis of SMS spam

Siyuan Tang

Xianghang Mi

Ying Li

XiaoFeng Wang

Kai Chen

2022/11/7

Robbery on devops: Understanding and mitigating illicit cryptomining on continuous integration service platforms

Zhi Li

Weijie Liu

Hongbo Chen

XiaoFeng Wang

Xiaojing Liao

...

2022/5/22

Sok: A modularized approach to study the security of automatic speech recognition systems

ACM Transactions on Privacy and Security

Yuxuan Chen

Jiangshan Zhang

Xuejing Yuan

Shengzhi Zhang

Kai Chen

...

2022/5/19

See List of Professors in XiaoFeng Wang University(Indiana University Bloomington)