default search action
Yinqian Zhang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xiaokuan Zhang, Yang Zhang, Yinqian Zhang:
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 21(3): 1032-1049 (2024) - [c84]Yuke Peng, Hongliang Tian, Jinyi Xian, Shuai Zhou, Shoumeng Yan, Yinqian Zhang:
Framekernel: A Safe and Efficient Kernel Architecture via Rust-based Intra-kernel Privilege Separation. APSys 2024: 31-37 - [c83]Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang:
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments. AsiaCCS 2024 - [c82]Weijie Chen, Yu Zhao, Yinqian Zhang, Weizhong Qiang, Deqing Zou, Hai Jin:
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks. ESORICS (4) 2024: 24-44 - [c81]Yifan Wu, Yinshuai Li, Hong Zhu, Yinqian Zhang:
SAEG: Stateful Automatic Exploit Generation. ESORICS (4) 2024: 127-145 - [c80]Weili Wang, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
Formally Verifying a Rollback-Prevention Protocol for TEEs. FORTE 2024: 155-173 - [c79]Chang Liu, Dongsheng Wang, Yongqiang Lyu, Pengfei Qiu, Yu Jin, Zhuoyuan Lu, Yinqian Zhang, Gang Qu:
Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit. HPCA 2024: 31-45 - [c78]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. RAID 2024: 298-316 - [c77]Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang:
HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64. USENIX Security Symposium 2024 - [c76]Tianyue Zheng, Jingzhi Hu, Rui Tan, Yinqian Zhang, Ying He, Jun Luo:
pi-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking. USENIX Security Symposium 2024 - [i23]Hanzheng Lyu, Shaokang Xie, Jianyu Niu, Chen Feng, Yinqian Zhang, Ivan Beschastnikh:
Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering (Extended Version). CoRR abs/2409.10954 (2024) - [i22]Xiaoqing Wen, Quanbi Feng, Jianyu Niu, Yinqian Zhang, Chen Feng:
MECURY: Practical Cross-Chain Exchange via Trusted Hardware. CoRR abs/2409.14640 (2024) - [i21]Xiaoqing Wen, Quanbi Feng, Jianyu Niu, Yinqian Zhang, Chen Feng:
TeeRollup: Efficient Rollup Design Using Heterogeneous TEE. CoRR abs/2409.14647 (2024) - 2023
- [j15]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4477-4490 (2023) - [j14]Juan Wang, Jie Wang, Chengyang Fan, Fei Yan, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Mengda Yang, Hongxin Hu:
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2936-2953 (2023) - [j13]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. IEEE Trans. Dependable Secur. Comput. 20(1): 827-840 (2023) - [j12]Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li:
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware. IEEE Trans. Dependable Secur. Comput. 20(3): 1959-1978 (2023) - [j11]Guoxing Chen, Yinqian Zhang:
Securing TEEs With Verifiable Execution Contracts. IEEE Trans. Dependable Secur. Comput. 20(4): 3222-3237 (2023) - [j10]Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng:
Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate. IEEE Trans. Dependable Secur. Comput. 20(5): 4154-4168 (2023) - [c75]Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
PANIC: PAN-assisted Intra-process Memory Isolation on ARM. CCS 2023: 919-933 - [c74]Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV. DIMVA 2023: 46-66 - [c73]Moein Ghaniyoun, Kristin Barber, Yuan Xiao, Yinqian Zhang, Radu Teodorescu:
TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments. ISCA 2023: 35:1-35:15 - [c72]Zhiyuan Sun, Xiapu Luo, Yinqian Zhang:
Panda: Security Analysis of Algorand Smart Contracts. USENIX Security Symposium 2023: 1811-1828 - [c71]Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin:
Reusable Enclaves for Confidential Serverless Computing. USENIX Security Symposium 2023: 4015-4032 - [c70]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
Controlled Data Races in Enclaves: Attacks and Detection. USENIX Security Symposium 2023: 4069-4086 - [c69]Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang:
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations. USENIX Security Symposium 2023: 6843-6860 - [i20]Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang:
SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks. CoRR abs/2302.00947 (2023) - [i19]Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng:
Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate. CoRR abs/2312.00741 (2023) - [i18]Mengya Zhang, Xiaokuan Zhang, Josh Barbee, Yinqian Zhang, Zhiqiang Lin:
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems. CoRR abs/2312.12573 (2023) - 2022
- [j9]Kristin Barber, Moein Ghaniyoun, Yinqian Zhang, Radu Teodorescu:
A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications. IEEE Comput. Archit. Lett. 21(1): 9-12 (2022) - [j8]Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang:
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography. ACM Comput. Surv. 54(6): 122:1-122:37 (2022) - [j7]Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang:
Cloud Computing Security: Foundations and Research Directions. Found. Trends Priv. Secur. 3(2): 103-213 (2022) - [j6]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Defeating traffic analysis via differential privacy: a case study on streaming traffic. Int. J. Inf. Sec. 21(3): 689-706 (2022) - [j5]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
Making Information Hiding Effective Again. IEEE Trans. Dependable Secur. Comput. 19(4): 2576-2594 (2022) - [c68]Rui Zhang, Michael D. Bond, Yinqian Zhang:
Cape: compiler-aided program transformation for HTM-based cache side-channel defense. CC 2022: 181-193 - [c67]Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang:
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud. CCS 2022: 2385-2399 - [c66]Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang:
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes. CCS 2022: 2841-2855 - [c65]Mengyao Xie, Chenggang Wu, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang, Zhe Wang:
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation. CCS 2022: 2989-3002 - [c64]Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures. NDSS 2022 - [c63]Jiuqin Zhou, Yuan Xiao, Radu Teodorescu, Yinqian Zhang:
ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX. SEED 2022: 145-156 - [c62]Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
vSGX: Virtualizing SGX Enclaves on AMD SEV. SP 2022: 321-336 - [c61]Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, Yinqian Zhang:
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP. SP 2022: 337-351 - [c60]Guoxing Chen, Yinqian Zhang:
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. USENIX Security Symposium 2022: 4095-4110 - [i17]Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, Zhiqiang Lin:
An Empirical Study on Ethereum Private Transactions and the Security Implications. CoRR abs/2208.02858 (2022) - 2021
- [c59]Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization. ACSAC 2021: 609-619 - [c58]Zeyu Zhang, Xiaoli Zhang, Qi Li, Kun Sun, Yinqian Zhang, Songsong Liu, Yukun Liu, Xiaoning Li:
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer. AsiaCCS 2021: 931-943 - [c57]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CCS 2021: 2937-2950 - [c56]Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin:
Specularizer : Detecting Speculative Execution Attacks via Performance Tracing. DIMVA 2021: 151-172 - [c55]Moein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu:
INTROSPECTRE: A Pre-Silicon Framework for Discovery and Analysis of Transient Execution Vulnerabilities. ISCA 2021: 874-887 - [c54]Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin:
Towards Formal Verification of State Continuity for Enclave Programs. USENIX Security Symposium 2021: 573-590 - [c53]Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng:
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. USENIX Security Symposium 2021: 717-732 - [c52]Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang:
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. USENIX Security Symposium 2021: 1665-1682 - [e2]Yinqian Zhang, Marten van Dijk:
CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8653-1 [contents] - [i16]Xiaoxuan Lou, Shangwei Guo, Tianwei Zhang, Yinqian Zhang, Yang Liu:
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels. CoRR abs/2102.03523 (2021) - [i15]Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang:
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography. CoRR abs/2103.14244 (2021) - [i14]Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu:
SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks. CoRR abs/2107.08367 (2021) - 2020
- [j4]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution. IEEE Secur. Priv. 18(3): 28-37 (2020) - [j3]Zeyu Mi, Haibo Chen, Yinqian Zhang, ShuangHe Peng, Xiaofeng Wang, Michael K. Reiter:
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring. IEEE Trans. Dependable Secur. Comput. 17(5): 1094-1108 (2020) - [c51]Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware. CCS 2020: 167-180 - [c50]Radu Sion, Yinqian Zhang:
CCSW'20: 2020 Cloud Computing Security Workshop. CCS 2020: 2133-2134 - [c49]Yuan Xiao, Yinqian Zhang, Radu Teodorescu:
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. NDSS 2020 - [c48]Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang:
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation. SP 2020: 592-607 - [c47]Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin:
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. USENIX Security Symposium 2020: 2775-2792 - [e1]Yinqian Zhang, Radu Sion:
CCSW'20, Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop, Virtual Event, USA, November 9, 2020. ACM 2020, ISBN 978-1-4503-8084-3 [contents] - [i13]Zhi Zhang, Yueqiang Cheng, Yinqian Zhang, Surya Nepal:
GhostKnight: Breaching Data Integrity via Speculative Execution. CoRR abs/2002.00524 (2020) - [i12]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin:
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV. CoRR abs/2008.00146 (2020) - [i11]Guoxing Chen, Yinqian Zhang:
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. CoRR abs/2008.09501 (2020)
2010 – 2019
- 2019
- [j2]Kristin Barber, Anys Bacha, Li Zhou, Yinqian Zhang, Radu Teodorescu:
Isolating Speculative Data to Prevent Transient Execution Attacks. IEEE Comput. Archit. Lett. 18(2): 178-181 (2019) - [c46]Kristin Barber, Anys Bacha, Li Zhou, Yinqian Zhang, Radu Teodorescu:
SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels. PACT 2019: 151-164 - [c45]Huibo Wang, Erick Bauman, Vishal Karande, Zhiqiang Lin, Yueqiang Cheng, Yinqian Zhang:
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach. AsiaCCS 2019: 114-121 - [c44]Yinqian Zhang, Radu Sion:
Speculative Execution Attacks and Cloud Security. CCSW 2019: 201 - [c43]Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang:
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps. CCS 2019: 1469-1483 - [c42]Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai:
OPERA: Open Remote Attestation for Intel's Secure Enclaves. CCS 2019: 2317-2331 - [c41]Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang:
Defeating Speculative-Execution Attacks on SGX with HyperRace. DSC 2019: 1-8 - [c40]Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, Kehuan Zhang:
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users. DSN 2019: 222-233 - [c39]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution. EuroS&P 2019: 142-157 - [c38]Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee:
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX. NDSS 2019 - [c37]Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang:
Statistical Privacy for Streaming Traffic. NDSS 2019 - [c36]Wubing Wang, Yinqian Zhang, Zhiqiang Lin:
Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. RAID 2019: 443-457 - [c35]Chaoshun Zuo, Zhiqiang Lin, Yinqian Zhang:
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps. IEEE Symposium on Security and Privacy 2019: 1296-1310 - [c34]Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi:
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. USENIX Security Symposium 2019: 1239-1256 - [c33]Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin:
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization. USENIX Security Symposium 2019: 1257-1272 - [i10]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - [i9]Tianwei Zhang, Jun Jiang, Yinqian Zhang:
Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications. CoRR abs/1911.09312 (2019) - [i8]Yuan Xiao, Yinqian Zhang, Radu Teodorescu:
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities. CoRR abs/1912.00329 (2019) - 2018
- [c32]Bo Lu, Xiaokuan Zhang, Ziman Ling, Yinqian Zhang, Zhiqiang Lin:
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites. ACSAC 2018: 89-100 - [c31]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
Analyzing Cache Side Channels Using Deep Neural Networks. ACSAC 2018: 174-186 - [c30]Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang:
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses. AsiaCCS 2018: 601-608 - [c29]Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu:
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic. CCS 2018: 1074-1088 - [c28]Xiang Pan, Anys Bacha, Spencer Rudolph, Li Zhou, Yinqian Zhang, Radu Teodorescu:
NVCool: When Non-Volatile Caches Meet Cold Boot Attacks. ICCD 2018: 439-448 - [c27]Guoxing Chen, Ten-Hwang Lai, Michael K. Reiter, Yinqian Zhang:
Differentially Private Access Patterns for Searchable Symmetric Encryption. INFOCOM 2018: 810-818 - [c26]Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. NDSS 2018 - [c25]Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, XiaoFeng Wang:
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS. NDSS 2018 - [c24]Guoxing Chen, Wenhao Wang, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin:
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races. IEEE Symposium on Security and Privacy 2018: 178-194 - [c23]Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang:
Static Evaluation of Noninterference Using Approximate Model Counting. IEEE Symposium on Security and Privacy 2018: 514-528 - [c22]Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
Peeking Behind the Curtains of Serverless Platforms. USENIX ATC 2018: 133-146 - [i7]Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang:
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections. CoRR abs/1801.01949 (2018) - [i6]Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai:
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution. CoRR abs/1802.09085 (2018) - 2017
- [j1]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Personalized Pseudonyms for Servers in the Cloud. Proc. Priv. Enhancing Technol. 2017(4): 271-289 (2017) - [c21]Sanchuan Chen, Xiaokuan Zhang, Michael K. Reiter, Yinqian Zhang:
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu. AsiaCCS 2017: 7-18 - [c20]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
DoS Attacks on Your Memory in Cloud. AsiaCCS 2017: 253-265 - [c19]Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang:
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves. CCS 2017: 859-874 - [c18]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CCS 2017: 2421-2434 - [c17]Yinqian Zhang:
Cache Side Channels: State of the Art and Research Opportunities. CCS 2017: 2617-2619 - [c16]Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin:
PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. CODASPY 2017: 173-184 - [i5]Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter:
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX. CoRR abs/1705.07289 (2017) - [i4]Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang:
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves. CoRR abs/1707.03473 (2017) - 2016
- [c15]Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang:
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices. CCS 2016: 858-870 - [c14]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A Software Approach to Defeating Side Channels in Last-Level Caches. CCS 2016: 871-882 - [c13]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds. RAID 2016: 118-140 - [c12]Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Radu Teodorescu:
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation. USENIX Security Symposium 2016: 19-35 - [i3]Tianwei Zhang, Yinqian Zhang, Ruby B. Lee:
Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation. CoRR abs/1603.03404 (2016) - [i2]Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang:
A software approach to defeating side channels in last-level caches. CoRR abs/1603.05615 (2016) - 2015
- [c11]Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang:
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. CCS 2015: 1582-1594 - [c10]Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-Tenant Public Clouds. USENIX Security Symposium 2015: 913-928 - [i1]Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael M. Swift:
A Placement Vulnerability Study in Multi-tenant Public Clouds. CoRR abs/1507.03114 (2015) - 2014
- [c9]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - 2013
- [c8]Yinqian Zhang, Michael K. Reiter:
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud. CCS 2013: 827-838 - 2012
- [c7]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - 2011
- [c6]Tingting Cui, XinBin Zhao, Zhe Wang, Yinqian Zhang:
Weight in Competitive K-Means Algorithm. ICFCE 2011: 1077-1084 - [c5]Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy 2011: 313-328 - 2010
- [c4]Yinqian Zhang, Fabian Monrose, Michael K. Reiter:
The security of modern password expiration: an algorithmic framework and empirical analysis. CCS 2010: 176-186
2000 – 2009
- 2008
- [c3]Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue:
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. ACSAC 2008: 215-224 - [c2]Yinqian Zhang, Xun Fan, Zhi Xue, Hao Xu:
Two Stochastic Models for Security Evaluation Based on Attack Graph. ICYCS 2008: 2198-2203 - [c1]Bing Duan, Yinqian Zhang, Dawu Gu:
An Easy-to-Deploy Penetration Testing Platform. ICYCS 2008: 2314-2318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint