Follow
Zongwei Zhou
Zongwei Zhou
Software Engineer at Google (Ph.D. from Carnegie Mellon University)
Verified email at andrew.cmu.edu - Homepage
Title
Cited by
Cited by
Year
TrustVisor: Efficient TCB reduction and attestation
JM McCune, Y Li, N Qu, Z Zhou, A Datta, V Gligor, A Perrig
2010 IEEE Symposium on Security and Privacy, 143-158, 2010
7782010
ROPecker: A generic and practical approach for defending against ROP attack
Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng
Internet Society, 2014
3532014
Building verifiable trusted path on commodity x86 computers
Z Zhou, VD Gligor, J Newsome, JM McCune
2012 IEEE symposium on security and privacy, 616-630, 2012
1672012
Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
A Vasudevan, E Owusu, Z Zhou, J Newsome, JM McCune
International conference on trust and trustworthy computing, 159-178, 2012
992012
Dancing with giants: Wimpy kernels for on-demand isolated i/o
Z Zhou, M Yu, VD Gligor
2014 IEEE symposium on security and privacy, 308-323, 2014
752014
Ten lessons from three generations shaped Google’s TPUv4i: Industrial product
NP Jouppi, DH Yoon, M Ashcraft, M Gottscho, TB Jablin, G Kurian, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
482021
Trusted display on untrusted commodity platforms
M Yu, VD Gligor, Z Zhou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
322015
Shortmac: efficient data-plane fault localization.
X Zhang, Z Zhou, HC Hsiao, THJ Kim, A Perrig, P Tague
NDSS, 2012
322012
Network fault localization with small TCB
X Zhang, Z Zhou, G Hasker, A Perrig, V Gligor
2011 19th IEEE International Conference on Network Protocols, 143-154, 2011
302011
MDH: A high speed multi-phase dynamic hash string matching algorithm for large-scale pattern set
Z Zhou, Y Xue, J Liu, W Zhang, J Li
International Conference on Information and Communications Security, 201-215, 2007
262007
Scale mlperf-0.6 models on google tpu-v3 pods
S Kumar, V Bitorff, D Chen, C Chou, B Hechtman, HJ Lee, N Kumar, ...
arXiv preprint arXiv:1909.09756, 2019
242019
KISS:“key it simple and secure” corporate key management
Z Zhou, J Han, YH Lin, A Perrig, V Gligor
International Conference on Trust and Trustworthy Computing, 1-18, 2013
242013
Method and apparatus for on-demand isolated I/O channels for secure applications
VD Gligor, Z Zhou, M Yu
US Patent 10,235,515, 2019
192019
Using trustworthy host-based information in the network
B Parno, Z Zhou, A Perrig
Proceedings of the seventh ACM workshop on Scalable trusted computing, 33-44, 2012
17*2012
Ten lessons from three generations shaped Google’s TPUv4i: Industrial product, in 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture (ISCA)
NP Jouppi, DH Yoon, M Ashcraft, M Gottscho, TB Jablin, G Kurian, ...
IEEE, 2021
102021
Security enhancement over ad-hoc AODV routing protocol
Z Zhou
Tsinghua University, Beijing, zhou-zw02@ mails. tsinghua. edu. cn, 2007
62007
Don’t Talk to Zombies: Mitigating DDoS Attacks via Attestation
B Parno, Z Zhou, A Perrig
June, 2009
52009
Dancing with giants: Wimpy kernels for on-demand I/O isolation
Z Zhou, M Yu, VD Gligor
IEEE Security & Privacy 13 (2), 38-46, 2015
42015
On-demand Isolated I/O for Security-sensitive Applications on Commodity Platforms
Z Zhou
Carnegie Mellon University, 2014
42014
Towards high-performance pattern matching on multi-core network processing platforms
Y Qi, Z Zhou, Y Wu, Y Xue, J Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20