Z
Zongwei Zhou
Researcher at Carnegie Mellon University
Publications - 30
Citations - 1589
Zongwei Zhou is an academic researcher from Carnegie Mellon University. The author has contributed to research in topics: Trusted computing base & Trusted Computing. The author has an hindex of 11, co-authored 29 publications receiving 1319 citations. Previous affiliations of Zongwei Zhou include Google & Tsinghua University.
Papers
More filters
Proceedings ArticleDOI
TrustVisor: Efficient TCB Reduction and Attestation
Jonathan M. McCune,Yanlin Li,Ning Qu,Zongwei Zhou,Anupam Datta,Virgil D. Gligor,Adrian Perrig +6 more
TL;DR: TrustVisor is presented, a special-purpose hypervisor that provides code integrity as well as data integrity and secrecy for selected portions of an application that has a very small code base that makes verification feasible.
Proceedings ArticleDOI
ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks
TL;DR: This paper presents a novel system, ROPecker, to efficiently and effectively defend against ROP attacks without relying on any other side information (e.g., source code and compiler support) or binary rewriting.
Proceedings ArticleDOI
Ten Lessons From Three Generations Shaped Google’s TPUv4i : Industrial Product
Norman P. Jouppi,Doe Hyun Yoon,Matthew Ashcraft,Mark Gottscho,Thomas B. Jablin,George Kurian,James Laudon,Sheng Li,Peter Ma,Xiaoyu Ma,Thomas Norrie,Nishant Patil,Sushma Prasad,Cliff Young,Zongwei Zhou,David A. Patterson +15 more
TL;DR: Google deployed several TPU generations since 2015, teaching us lessons that changed our views: semi-conductor technology advances unequally; compiler compatibility trumps binary compatibility, especially for VLIW domain-specific architectures (DSA); target total cost of ownership vs initial cost; support multi-tenancy; deep neural networks (DNN) grow 1.5X annually; some inference tasks require floating point; inference DSAs need air-cooling; apps limit latency, not batch size; and backwards ML compatibility helps deploy DNNs quickly.
Proceedings ArticleDOI
Building Verifiable Trusted Path on Commodity x86 Computers
TL;DR: A hyper visor-based design is presented that enables a trusted path to bypass an untrusted operating-system, applications, and I/O devices, with a minimal Trusted Computing Base (TCB).
Book ChapterDOI
Trustworthy execution on mobile devices: what security properties can my mobile platform give me ?
TL;DR: In this article, the authors consider the different stakeholders in today's mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users.