scispace - formally typeset
Z

Zongwei Zhou

Researcher at Carnegie Mellon University

Publications -  30
Citations -  1589

Zongwei Zhou is an academic researcher from Carnegie Mellon University. The author has contributed to research in topics: Trusted computing base & Trusted Computing. The author has an hindex of 11, co-authored 29 publications receiving 1319 citations. Previous affiliations of Zongwei Zhou include Google & Tsinghua University.

Papers
More filters
Proceedings ArticleDOI

TrustVisor: Efficient TCB Reduction and Attestation

TL;DR: TrustVisor is presented, a special-purpose hypervisor that provides code integrity as well as data integrity and secrecy for selected portions of an application that has a very small code base that makes verification feasible.
Proceedings ArticleDOI

ROPecker: A Generic and Practical Approach For Defending Against ROP Attacks

TL;DR: This paper presents a novel system, ROPecker, to efficiently and effectively defend against ROP attacks without relying on any other side information (e.g., source code and compiler support) or binary rewriting.
Proceedings ArticleDOI

Ten Lessons From Three Generations Shaped Google’s TPUv4i : Industrial Product

TL;DR: Google deployed several TPU generations since 2015, teaching us lessons that changed our views: semi-conductor technology advances unequally; compiler compatibility trumps binary compatibility, especially for VLIW domain-specific architectures (DSA); target total cost of ownership vs initial cost; support multi-tenancy; deep neural networks (DNN) grow 1.5X annually; some inference tasks require floating point; inference DSAs need air-cooling; apps limit latency, not batch size; and backwards ML compatibility helps deploy DNNs quickly.
Proceedings ArticleDOI

Building Verifiable Trusted Path on Commodity x86 Computers

TL;DR: A hyper visor-based design is presented that enables a trusted path to bypass an untrusted operating-system, applications, and I/O devices, with a minimal Trusted Computing Base (TCB).
Book ChapterDOI

Trustworthy execution on mobile devices: what security properties can my mobile platform give me ?

TL;DR: In this article, the authors consider the different stakeholders in today's mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users.