Prof. Zhe Wang, System Security, Best Researcher Award
Professor at Institute of Computing Technology, Chinese Academy of Sciences, China
Zhe Wang, an Associate Professor at the State Key Laboratory of Processor, Institute of Computing Technology of CAS, Beijing, boasts a Ph.D. in Computer Architecture from the University of Chinese Academy of Sciences. He completed his Bachelor of Science in Software Engineering at Beijing University of Technology. His research interests include dynamic binary translation, cross-ISA system-level virtualization, and memory corruption attacks and defenses. Zhe has garnered numerous scholarships and awards for his outstanding academic performance.
Author Metrics
Zhe Wang’s prolific academic career is evident in his author metrics, showcasing a wealth of contributions to the field. He has authored/co-authored numerous papers published in prestigious conferences and journals, including several CCF-A and CCF-B ranked venues. Zhe’s research has garnered significant attention, with papers receiving distinguished awards and honorable mentions.
Zhe Wang’s citation metrics reflect a solid impact in the academic community. With 186 citations, his h-index and i10-index both stand at 8. This indicates that Zhe has authored at least 8 papers that have each been cited at least 8 times, showcasing a consistent level of influence and recognition in his field. These metrics are indicative of Zhe’s contributions to advancing knowledge and understanding within computer architecture and security.
Education
Zhe Wang’s academic journey is marked by excellence. He earned his Ph.D. in Computer Architecture from the University of Chinese Academy of Sciences in 2018. Prior to this, he obtained his Bachelor of Science in Software Engineering from Beijing University of Technology in 2012.
Research Focus
Zhe Wang’s research is focused on several key areas within computer architecture and security. His interests encompass dynamic binary translation, cross-ISA system-level virtualization, hardware-assisted virtualization, and various aspects of memory corruption attacks and defenses. His work contributes to advancing the understanding and mitigation of security vulnerabilities in computer systems.
Professional Journey
Zhe Wang’s professional journey has seen him rise to the position of Associate Professor at the Institute of Computing Technology of CAS, Beijing. He has accumulated extensive experience in his field, with a focus on computer architecture, virtualization, and security. Zhe has actively contributed to research, education, and academic service throughout his career.
Honors & Awards
Zhe Wang’s exceptional academic performance has been recognized through numerous honors and awards. He has received prestigious scholarships such as the CAS Presidential Scholarship and the ICT Presidential Scholarship. Zhe’s research contributions have also been acknowledged with awards such as Distinguished Paper Awards and Best Paper Honorable Mentions at renowned conferences.
Publications Noted & Contributions
Zhe Wang’s publications are notable for their quality and impact on the field. His research contributions span a wide range of topics, including intra-process memory isolation, speculation contention attacks, and code obfuscation techniques. His papers have been published in respected venues such as IEEE Transactions and ACM conferences, contributing valuable insights to computer architecture and security.
Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware
- Authors: C. Wu, M. Xie, Z. Wang, Y. Zhang, K. Lu, X. Zhang, Y. Lai, Y. Kang, M. Yang, …
- Published in IEEE Transactions on Dependable and Secure Computing in 2022
- Citations: 6
Khaos: The impact of inter-procedural code obfuscation on binary diffing techniques
- Authors: P. Zhang, C. Wu, M. Peng, K. Zeng, D. Yu, Y. Lai, Y. Kang, W. Wang, Z. Wang
- Presented at the 21st ACM/IEEE International Symposium on Code Generation …
- Published in 2023
- Citations: 5
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks
- Authors: B. Tang, C. Wu, Z. Wang, L. Jia, PC. Yew, Y. Cheng, Y. Zhang, C. Wang, …
- Published in IEEE Transactions on Dependable and Secure Computing in 2022
- Citations: 2
KOP-Fuzzer: A Key-Operation-based Fuzzer for Type Confusion Bugs in JavaScript Engines
- Authors: L. Sun, C. Wu, Z. Wang, Y. Kang, B. Tang
- Presented at the 2022 IEEE 46th Annual Computers, Software, and Applications Conference …
- Published in 2022
- Citations: 1
Using local clocks to reproduce concurrency bugs
- Authors: Z. Wang, C. Wu, X. Yuan, Z. Wang, J. Li, PC. Yew, J. Huang, X. Feng, Y. Lan, …
- Published in IEEE Transactions on Software Engineering in 2017
- Citations: 1
Research Timeline
Zhe Wang’s research timeline reflects a consistent dedication to advancing knowledge in his field. Starting with his early contributions during his Ph.D., Zhe has continued to produce high-quality research outputs over the years. His work has evolved to address emerging challenges in computer architecture and security, with each publication contributing to the broader research landscape.
Collaborations and Projects
Zhe Wang has been actively involved in collaborations and projects aimed at pushing the boundaries of computer architecture and security. His research collaborations involve academia and industry partners, facilitating the exchange of ideas and expertise. Zhe has led and contributed to various projects that explore novel solutions to security challenges in computer systems, fostering innovation and advancement in the field.