发表论文
近五年代表性论文:
1. Quancheng Wang, Ming Tang*, Ke Xu, Han Wang. Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities. 2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2024.(CCF-A会议,体系结构四大顶会)
2. Ke Xu, Ming Tang*, Quancheng Wang, Han Wang. Exploitation of Security Vulnerability on Retirement. 2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2024.(CCF-A会议,体系结构四大顶会)
3. Han Wang, Ming Tang*, Ke Xu, Quancheng Wang. Cache Bandwidth Contention Leaks Secrets. 2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024.(CCF-B会议)
4. Yanbin Li, Jiajie Zhu, Zhe Liu, Ming Tang*, Shougang Ren. Deep Learning Gradient Visualization-Based Pre-Silicon Side-Channel Leakage Location. IEEE Transactions on Information Forensics and Security, 2024.(CCF-A期刊)
5. Quancheng Wang, Ming Tang*, Jianming Fu. EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones. IEEE Internet of Things Journal, 2024.(SCI一区期刊)
6. Botao Liu, Ming Tang*. MS-LW-TI: Primitive-based First-Order Threshold Implementation for 4×4 S-boxes. IET Information Security, 2024.(CACR-B期刊)
7. Ke Xu, Ming Tang*, Han Wang, Sylvain Guilley. Reverse-Engineering and Exploiting the Frontend Bus of Intel Processor. IEEE Transactions on Computers, 2023.(CCF-A期刊)
8. Yuzhe Gu, Ming Tang*, Quancheng Wang, Han Wang, Haili Ding. One more set: Mitigating conflict-based cache side-channel attacks by extending cache set.Journal of Systems Architecture, 2023.(CCF-B期刊)
9. Chong Xiao, Ming Tang*, Sylvain Guilley. Exploiting the microarchitectural leakage of prefetching activities for side-channel attacks. Journal of Systems Architecture, 2023.(CCF-B期刊)
10. 李延斌, 朱嘉杰, 唐明*, 张焕国. 面向格密码的能耗分析攻击技术. 计算机学报, 2023.(CCF-T1期刊)
11. 唐明*, 胡一凡. Load-to-store: store buffer暂态窗口时间泄露的利用. 通信学报, 2023.(CCF-T1期刊)
12. Yanbin Li, Jiajie Zhu, Yuxin Huang, Zhe Liu, Ming Tang*. Single-Trace Side-Channel Attacks on the Toom-Cook: The Case Study of Saber. The annual Conference on Cryptographic Hardware and Embedded Systems (CHES), 2022.(CCF-B会议)
13. Yanbin Li, Zhe Liu, Sylvain Guilley, Ming Tang*. Analysis of Multiplicative Low Entropy Masking Schemes Against Correlation Power Attack. IEEE Transactions on Information Forensics and Security, 2021.(CCF-A期刊)
14. 王娅茹, 唐明*. 基于Bartlett和多分类F检验侧信道泄露评估. 通信学报, 2021.(CCF-T1期刊)
15. Zhipeng Guo, Ming Tang*, Emmanuel Prouff, Maixing Luo, Fei Yan. Table Recomputation-Based Higher-Order Masking Against Horizontal Attacks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020.(CCF-A期刊)
16. Fangfei Yang, Ming Tang*, Ozgur Sinanoglu. Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) – Unlocked. IEEE Transactions on Information Forensics and Security, 2019.(CCF-A期刊)
17. 郭志鹏, 唐明*, 胡晓波, 李煜光, 彭国军, 张焕国. 基于软件指令定位的新型高阶侧信道分析方法. 计算机学报, 2019.(CCF-T1期刊)