Publications
2020
- [CCS'20] FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware
Haohuang Wen, Zhiqiang Lin, Yinqian Zhang
ACM Conference on Computer and Communications Security, Nov. 2020.
[Pdf] | [Bib]
- [Security'20] TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
USENIX Security Symposium, Aug. 2020.
[Pdf] | [Bib]
- [S&P'20] SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation
Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yang Kang, Min Yang
IEEE Symposium on Security and Privacy, May 2020.
[Pdf] | [Bib]
- [NDSS'20] SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
Yuan Xiao, Yinqian Zhang, Mircea-Radu Teodorescu
Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2020.
[Pdf] | [Bib]
- [IEEE Secur & Priv] SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution
Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten-Hwang Lai
IEEE Secur. Priv. 18(3): 28-37 (2020)
2019
- [DSC'19] Defeating Speculative-Execution Attacks on SGX with HyperRace
Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang
IEEE Conference on Dependable and Secure Computing, Hangzhou, China, Nov. 2019.
[Pdf] | [Bib]
- [CCS'19] OPERA: Open Remote Attestation for Intel’s Secure Enclaves
Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai
ACM Conference on Computer and Communications Security, London, UK, Nov. 2019.
[Pdf] | [Bib]
- [CCS'19] Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang
ACM Conference on Computer and Communications Security, London, UK, Nov. 2019.
[Pdf] | [Bib]
- [PACT'19] SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels
Kristin Barber, Anys Bacha, Li Zhou, Yinqian Zhang, Radu Teodorescu
International Conference on Parallel Architectures and Compilation Techniques, Seattle, WA, USA, Sep. 2019.
[Pdf] | [Bib]
- [RAID'19] Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries
Wubing Wang, Yinqian Zhang, Zhiqiang Lin
International Symposium on Research in Attacks, Intrusions and Defenses, Beijing, China, Sep. 2019.
[Pdf] | [Bib]
- [Security'19] Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization
Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
USENIX Security Symposium, Santa Clara, CA, Aug. 2019.
[Pdf] | [Bib] | [Presentation]
- [Security'19] SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization
Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi
USENIX Security Symposium, Santa Clara, CA, Aug. 2019.
[Pdf] | [Bib] | [Slides]
- [CAL] Isolating Speculative Data to Prevent
Transient Execution Attacks
Kristin Barber, Anys Bacha, Li Zhou, Yinqian Zhang, Radu Teodorescu
IEEE Computer Architecture Letters (CAL), 2019.
[Pdf]
- [AsiaCCS'19] Running Language Interpreters Inside SGX: A Lightweight Legacy-Compatible Script Code Hardening Approach
Huibo Wang, Erick Bauman, Vishal Karande, Yueqiang Cheng, Zhiqiang Lin, Yinqian Zhang (Short Paper)
ACM ASIA Conference on Information, Computer and Communications Security, Auckland, New Zealand, Jul. 2019.
[Pdf] | [Bib]
- [DSN'19] Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users
Jiongyi Chen, Chaoshun Zuo, Wenrui Diao, Shuaike Dong, Qingchuan Zhao, Menghan Sun, Zhiqiang Lin, Yinqian Zhang, and Kehuan Zhang
IEEE/IFIP International Conference on Dependable Systems and Networks, Portland, Oregon, USA, Jun. 2019
[Pdf] | [Bib]
- [EuroS&P'19] SGXPECTRE: Stealing Intel Secrets from SGX Enclaves via Speculative Execution
Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai
(The EuroS&P version of this paper supersedes an earlier Arxiv version "SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution")
Arxiv pre-print version, Feb. 2018.
[Project Homepage]
[Pdf] | [Bib]
- [NDSS'19] Statistical Privacy for Streaming Traffic
Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang
Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019.
[Pdf] | [Bib]
- [NDSS'19] OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX
Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee
Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019.
[Pdf] | [Bib]
- [S&P'19] Why Does Your Data Leak? Uncovering the Data Leakage in Cloud From Mobile Apps
Chaoshun Zuo, Zhiqiang Lin, and Yinqian Zhang.
IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2019.
[Pdf] | [Bib] | [Slides]
2018
- [ACSAC'18] Analyzing Cache Side Channels Using Deep Neural Networks
Tianwei Zhang, Yinqian Zhang, Ruby Lee
Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, Dec. 2018
[Pdf] | [Bib]
- [ACSAC'18] A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites
Bo Lu*, Xiaokuan Zhang*, Ziman Ling, Yinqian Zhang, Zhiqiang Lin
Annual Computer Security Applications Conference, San Juan, Puerto Rico, USA, Dec. 2018 (*co-first authors)
[Pdf] | [Bib]
- [ICCD'18] NVCool: When Non-Volatile Caches Meet Cold Boot Attacks
Xiang Pan, Anys Bacha, Spencer Rudolph, Li Zhou, Yinqian Zhang and Radu Teodorescu
IEEE International Conference on Computer Design, Orlando, Florida, USA, Oct. 2018.
[Pdf] | [Bib]
- [CCS'18] HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu
ACM Conference on Computer and Communications Security, Toronto, Canada, Oct. 2018.
[Pdf] | [Bib]
- [TDSC] CPU Elasticity to Mitigate Cross-VM Runtime Monitoring
Zeyu Mi, Haibo Chen, Yinqian Zhang, Shuanghe Peng, Xiaofeng Wang, and Michael Reiter
Transactions on Dependable and Secure Computing, 2018.
[Pdf] | [Bib]
- [ATC'18] Peeking Behind the Curtains of Serverless Platforms
Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael Swift
Usenix Annual Technical Conference, Boston, MA, USA, Jul. 2018.
[Pdf] | [Bib]
- [AsiaCCS'18] Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses
Sanchuan Chen, Fangfei Liu, Zeyu Mi, Yinqian Zhang, Ruby B. Lee, Haibo Chen, XiaoFeng Wang (Short Paper)
ACM ASIA Conference on Information, Computer and Communications Security, Songdo, Incheon, Korea, Jun. 2018.
[Pdf]
- [S&P'18] Static Evaluation of Noninterference Using Approximate Model Counting
Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang
IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2018.
[Pdf] | [Bib]
- [S&P'18] Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
Guoxing Chen*, Wenhao Wang*, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin
IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2018. (* co-first authors)
[Pdf] | [Bib]
- [INFOCOM'18] Differentially Private Access Patterns for Searchable Symmetric Encryption
Guoxing Chen, Ten H. Lai, Michael Reiter, Yinqian Zhang
IEEE International Conference on Computer Communications, Honolulu, HI, USA, Apr. 2018.
[Pdf] | [Bib]| [Source code]
- [NDSS'18] OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS
Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, Xiaofeng Wang
Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2018.
Top 10 Finalists of CSAW Best Applied Research Paper Award
[Pdf] | [Bib] | [Video]
- [NDSS'18] Face Flashing: A Secure Liveness Detection Protocol based on Light Reflections
Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2018.
[Pdf] | [Bib]
2017
- [CCS'17] Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang
ACM Conference on Computer and Communications Security, Dallas, Texas, USA, Oct. 2017.
(The CCS version of this paper supersedes arxiv 1707.03473.)
[Pdf] | [Bib] | [Slides] | [Project Homepage]
- [CCS'17] Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
ACM Conference on Computer and Communications Security, Dallas, Texas, USA, Oct. 2017.
(The CCS version of this paper supersedes arxiv 1705.07289.)
[Pdf] | [Bib]
- [PETS'17] Personalized Pseudonyms for Servers in the Cloud
Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
Privacy Enhancing Technologies Symposium, Minneapolis, Minnesota, Jul. 2017.
[Pdf] | [Bib] | [Demo] | [Presentation]
- [AsiaCCS'17] Detecting Privileged Side-Channel Attacks in Shielded Execution with DEJA VU
Sanchuan Chen, Xiaokuan Zhang, Michael Reiter, Yinqian Zhang
ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE, Apr. 2017.
[Pdf] | [Bib]
- [AsiaCCS'17] DoS Attacks on Your Memory in the Cloud
Tianwei Zhang, Yinqian Zhang, Ruby B. Lee
ACM Asia Conference on Computer and Communications Security, Abu Dhabi, UAE, Apr. 2017.
(The AsiaCCS version of this paper supersedes arxiv 1603.03404.)
[Pdf] | [Bib]
- [CODASPY'17] Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace
Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin
ACM Conference on Data and Applications Security and Privacy, Scottsdale, Arizona, Mar. 2017.
[Pdf] | [Bib]
2016
- [CCS'16] Return-Oriented Flush-Reload Side Channels on ARM and Their
Implications for Android Devices
Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang
ACM Conference on Computer and Communications Security, Vienna, Austria, Oct. 2016.
[Pdf] | [Bib] | [Slides]
- [CCS'16] A Software Approach to Defeating Side Channels in Last-Level Caches
Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang
ACM Conference on Computer and Communications Security, Vienna, Austria, Oct. 2016.
(The CCS version of this paper supersedes arxiv 1603.05615.)
[Pdf] | [Bib]
- [RAID'16] CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds
Tianwei Zhang, Yinqian Zhang, Ruby Lee
International Symposium on Research in Attacks, Intrusions and Defenses, Sep. 2016.
[Pdf] | [Bib]
- [Security'16] One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Mircea-Radu Teodorescu
USENIX Security Symposium, Austin, TX, Aug. 2016.
Top 10 Finalists of CSAW Best Applied Research Paper Award
[Pdf] | [Bib] | [Slides]
2015
- [CCS'15] Mitigating Storage Side Channels Using Statistical Privacy Mechanisms
Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
ACM Conference on Computer and Communications Security, Denver, Colorado, Oct. 2015.
[Pdf] | [Bib]
- [Security'15] A Placement Vulnerability Study in Multi-Tenant Public Clouds
Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart and Michael Swift
USENIX Security Symposium, Washington, D.C., Aug. 2015.
[Pdf] | [Bib]
2014 and before
- [CCS'14] Cross-Tenant Side-Channel Attacks in PaaS Clouds
Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
ACM Conference on Computer and Communications Security, Scottsdale, AZ, Nov. 2014.
[Pdf] | [Bib]
- [CCS'13] Düppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud
Yinqian Zhang, Michael K. Reiter
ACM Conference on Computer and Communications Security, Berlin, Germany, Nov. 2013.
[Pdf] | [Bib]
- [CCS'12] Cross-VM Side Channels and Their Use to Extract Private Keys
Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
ACM Conference on Computer and Communications Security, Raleigh, NC, Oct. 2012.
[Pdf] | [Bib] | [Slides]
- [S&P'11] HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter
IEEE Symposium on Security and Privacy, Oakland, CA, May 2011.
[Pdf] | [Bib]
- [CCS'10] The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
Yinqian Zhang, Fabian Monrose, Michael K. Reiter
ACM Conference on Computer and Communications Security, Chicago, IL, Oct. 2010.
[Pdf] | [Bib]
- [ACSAC'08] Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences
Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue
Annual Computer Security Applications Conference, Anaheim, CA, Dec. 2008.
[Pdf] | [Bib]
* Ranking of security conferences can be found here and here, but note they do not completely reflect my perception of these conferences.