Publications at Top-tier Security & System Conferences / Journals (CCF-A)

A complete list may be found at publications.


    Conference Papers

  1. [MICRO'25] ρHammer: Reviving RowHammer Attacks on New Architectures via Prefetching
  2. Weijie Chen, Shan Tang, Yulin Tang, Xiapu Luo, Yinqian Zhang, Weizhong Qiang
    IEEE/ACM International Symposium on Microarchitecture, Seoul, Korea, Oct. 18 – Oct. 22, 2025.
  3. [CCS'25] Tide: An Efficient Kernel-level Isolation Execution Environment on AArch64 via Dynamically Adjusting Output Address Size
  4. Shiyang Zhang, Chenggang Wu, Chengxuan Hou, Jinglin Lv, Yinqian Zhang, Qianyu Guo, Yuanming Lai, Mengyao Xie, Yan Kang, Zhe Wang
    ACM Conference on Computer and Communications Security, Taipei, Taiwan, China, Oct. 13-17, 2025.
  5. [CCS'25] An Empirical Study Measuring In-The-Wild Cryptographic Microarchitectural Side-Channel Patches
  6. Sen Deng, Zhibo Liu, Shuai Wang, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Taipei, Taiwan, China, Oct. 13-17, 2025.
  7. [CCS'25] GhostCache: Timer-Free and Counter-Free RISC-Based Instruction Cache Attacks
  8. Yu Jin, Minghong Sun, Dongsheng Wang, Pengfei Qiu, Yinqian Zhang, Shuwen Deng
    ACM Conference on Computer and Communications Security, Taipei, Taiwan, China, Oct. 13-17, 2025.
  9. [Security'25] EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS
  10. Jiaqin Yan, Qiujiang Chen, Shuai Zhou, Yuke Peng, Guoxing Chen, Yinqian Zhang
    USENIX Security Symposium, Seattle, WA, U.S.A., Aug. 13-15, 2025.
  11. [Security'25] Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption
  12. Wei Peng, Yinshuai Li, Yinqian Zhang
    USENIX Security Symposium, Seattle, WA, U.S.A., Aug. 13-15, 2025.
  13. [Security'25] Automated Soundness and Completeness Vetting of Polygon zkEVM
  14. Xinghao Peng, Zhiyuan Sun, Kunsong Zhao, Zuchao Ma, Zihao Li, Jinan Jiang, Xiapu Luo, Yinqian Zhang
    USENIX Security Symposium, Seattle, WA, U.S.A., Aug. 13-15, 2025.
  15. [ATC'25] ASTERINAS: A Linux ABI-Compatible, Rust-Based Framekernel OS with a Small and Sound TCB
  16. Yuke Peng, Hongliang Tian, Junyang Zhang, Ruihan Li, Chengjun Chen, Jianfeng Jiang, Jinyi Xian, Xiaolin Wang, Chenren Xu, Diyu Zhou,Yingwei Luo, Shoumeng Yan, Yinqian Zhang
    USENIX Annual Technical Conference, Boston, MA, U.S.A., Jul. 7-9, 2025.
  17. [DAC'25] Zion: A Practical Confidential Virtual Machine Architecture on Commodity RISC-V Processors
  18. Jie Wang, Juan Wang, Yinqian Zhang
    Design Automation Conference, San Francisco, CA, U.S.A., Jun. 23-25, 2025.
  19. [DAC'25] ZenLeak: Practical Last-Level Cache Side-Channel Attacks on AMD Zen Processors
  20. Han Wang, Ming Tang, Quancheng Wang, Ke Xu, Yinqian Zhang
    ACM International Conference on the Foundations of Software Engineering, San Francisco, CA, U.S.A., Jun. 23-25, 2025.
  21. [FSE'25] Detecting Smart Contract State-Inconsistency Bugs via Flow Divergence and Multiplex Symbolic Execution
  22. Yinxi Liu, Wei Meng, Yinqian Zhang
    ACM International Conference on the Foundations of Software Engineering, Trondheim, Norway, Jun. 2025.
  23. [ICDE'25] Orthrus: Accelerating Multi-BFT Consensus through Concurrent Partial Ordering of Transactions
  24. Hanzheng Lyu, Shaokang Xie, Jianyu Niu, Ivan Beschastnikh, Yinqian Zhang, Mohammad Sadoghi, Chen Feng
    IEEE International Conference on Data Engineering, Hong Kong, China, May 19-23, 2025.
  25. [S&P'25] CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels
  26. Yuanyuan Yuan, Zhibo Liu, Sen Deng, Shuai Wang, Yinqian Zhang, Zhendong Su
    IEEE Symposium on Security and Privacy, San Francisco, CA, May. 12-14, 2025.
    Distinguished Paper Award
    [Pdf] | [Bib]
  27. [ASPLOS'25] DejaVuzz: Disclosing Transient Execution Bugs with Dynamic Swappable Memory and Differential Information Flow Tracking assisted Processor Fuzzing
  28. Jinyan Xu, Yangye Zhou, Xingzhi Zhang, Yinshuai Li, Qinhan Tan, Yinqian Zhang, Yajin Zhou, Rui Chang, Wenbo Shen
    ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Rotterdam, The Netherlands, Mar. 30- Apr. 3, 2025 (To be presented at ASPLOS'26).
  29. [NDSS'25] I Know What You Asked: Prompt Leakage via KV-Cache Sharing in Multi-Tenant LLM Serving
  30. Guanlong Wu, Zheng Zhang, Jianyu Niu, Weili Wang, Yao Zhang, Ye Wu, Yinqian Zhang
    Network and Distributed System Security Symposium, San Diego, CA,U.S.A., Feb. 24-28, 2025.
    [Pdf] | [Bib]
  31. [NDSS'25] WAVEN: WebAssembly Memory Virtualization for Enclaves
  32. Weili Wang, Honghan Ji, Peixuan He, Yao Zhang, Ye Wu, Yinqian Zhang
    Network and Distributed System Security Symposium, San Diego, CA,U.S.A., Feb. 24-28, 2025.
    [Pdf] | [Bib]
  33. [EuroSys'25] Achilles: Efficient TEE-Assisted BFT Consensus via Rollback Resilient Recovery
  34. Jianyu Niu, Guanlong Wu, Shengqi Liu, Xiaoqing Wen, Jiangshan Yu, Yinqian Zhang
    European Conference on Computer Systems, Rotterdam, The Netherlands, Mar. 30 - Apr. 3, 2025.
  35. [EuroSys'25] Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering
  36. Hanzheng Lyu, Shaokang Xie, Jianyu Niu, Chen Feng, Yinqian Zhang, Ivan Beschastnikh
    European Conference on Computer Systems, Rotterdam, The Netherlands, Mar. 30 - Apr. 3, 2025.
    [Pdf]
  37. [CCS'24] DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back
  38. Zhiyuan Sun, Zihao Li, Xinghao Peng, Xiapu Luo, Muhui Jiang, Hao Zhou, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Salt Lake City, U.S.A., Oct. 14-18, 2024.
    [Pdf] | [Bib]
    Distinguished Paper Award
  39. [CCS'24] HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels
  40. Yuanyuan Yuan, Zhibo Liu, Sen Deng, Yanzuo Chen, Shuai Wang, Yinqian Zhang, Zhendong Su
    ACM Conference on Computer and Communications Security, Salt Lake City, U.S.A., Oct. 14-18, 2024.
    [Pdf] | [Bib]
  41. [Security'24] π-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking
  42. Tianyue Zheng, Jingzhi Hu, Rui Tan, Yinqian Zhang, Ying He, Jun Luo
    USENIX Security Symposium, Philadelphia, PA, USA, Aug. 14-16, 2024.
    [Pdf] | [Bib]
  43. [Security'24] HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64
  44. Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Shiyang Zhang, Bing Hu, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang
    USENIX Security Symposium, Philadelphia, PA, USA, Aug. 14-16, 2024.
    [Pdf] | [Bib]
  45. [HPCA'24] Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit
  46. Chang Liu, Dongsheng Wang, Yongqiang Lyu, Pengfei Qiu, Yu Jin, Zhuoyuan Lu, Yinqian Zhang, Gang Qu
    IEEE International Symposium on High-Performance Computer Architecture, Edinburgh, Scotland, UK, Mar. 2-6, 2024.
    [Pdf] | [Bib]
  47. [CCS'23] PANIC: PAN-assisted Intra-process Memory Isolation on ARM
  48. Jiali Xu, Mengyao Xie, Chenggang Wu, Yinqian Zhang, Qijing Li, Xuan Huang, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang
    ACM Conference on Computer and Communications SecurityCopenhagen, Denmark, 26-30 Nov., 2023.
    Distinguished Paper Award
    [Pdf] | [bib]
  49. [Security'23] Reusable Enclaves for Confidential Serverless Computing
  50. Shixuan Zhao, Pinshen Xu, Guoxing Chen, Mengya Zhang, Yinqian Zhang, Zhiqiang Lin
    USENIX Security Symposium, Anaheim, CA, USA, August 9–11, 2023.
    [Pdf] | [bib]
  51. [ISCA'23] TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments
  52. Moein Ghaniyoun, Kristin Barber, Yuan Xiao, Yinqian Zhang, Radu Teodorescu
    International Symposium on Computer Architecture, Orlando, FL, USA, June 17–21, 2023.
    [Pdf] | [bib]
  53. [Security'23] Panda: Security Analysis of Algorand Smart Contracts
  54. Zhiyuan Sun, Xiapu Luo, Yinqian Zhang
    USENIX Security Symposium, Anaheim, CA, USA, August 9–11, 2023.
    [Pdf] | [bib]
  55. [Security'23] Controlled Data Races in Enclaves: Attacks and Detection
  56. Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    USENIX Security Symposium, Anaheim, CA, USA, August 9–11, 2023.
    [Pdf] | [bib]
  57. [Security'23] CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
  58. Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang
    USENIX Security Symposium, Anaheim, CA, USA, August 9–11, 2023.
    [Pdf] | [bib]
  59. [CCS'22] Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud
  60. Jianyu Niu, Wei Peng, Xiaokuan Zhang, Yinqian Zhang
    ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.
    [Pdf] | [Bib]
  61. [CCS'22] ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes
  62. Weili Wang, Sen Deng, Jianyu Niu, Michael K. Reiter, Yinqian Zhang
    ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.
    [Pdf] | [Bib]
  63. [CCS'22] CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation
  64. Mengyao Xie, Chenggang Wu, Zhe Wang, Yinqian Zhang, Jiali Xu, Yuanming Lai, Yan Kang, Wei Wang
    ACM Conference on Computer and Communications Security (CCS) , Los Angeles, USA, Nov. 2022.
    Best Paper Award Honorable Mention
    [Pdf] | [Bib]
  65. [S&P'22] A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP
  66. Mengyuan Li, Luca Wilke, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu and Yinqian Zhang
    IEEE Symposium on Security and Privacy, San California, May 2022.
    Top 10 Finalists of CSAW Best Applied Research Paper Award
    [Pdf] | [Bib]
  67. [S&P'22] vSGX: Virtualizing SGX Enclaves on AMD SEV
  68. Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
    IEEE Symposium on Security and Privacy, Virtual, May 2022.
    [Pdf] | [Bib] | [Source Code]
  69. [NDSS'22] Multi-Certificate Attacks against Proof-of-Elapsed-Time And Their Countermeasures
  70. Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin
    Network and Distributed System Security Symposium, 2022.
    [Pdf]
  71. [Security'22] MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
  72. Guoxing Chen, Yinqian Zhang
    USENIX Security Symposium, BOSTON, MA, USA, 2022.
    [Pdf] | [Source Code]
  73. [Security'21] Towards Formal Verification of State Continuity for Enclave Programs
  74. Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin
    USENIX Security Symposium, Virtual, Aug. 2021.
    [Pdf] | [Slides]
  75. [Security'21] CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel
  76. Mengyuan Li Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Cheng
    USENIX Security Symposium, Virtual, Aug. 2021.
    [Pdf] | [Bib] | [Project Homepage]
  77. [Security'21] SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting
  78. Sanchuan Chen, Zhiqiang Lin, Yinqian Zhang
    USENIX Security Symposium, Virtual, Aug. 2021.
    [Pdf] | [Slides] | [Source Code]
  79. [ISCA'21] INTROSPECTRE: A Pre-Silicon Framework for Discovery and Analysis of Transient ExecutionVulnerabilities
  80. Moein Ghaniyoun, Kristin Barber, Yinqian Zhang, Radu Teodorescu
    International Symposium on Computer Architecture, Virtual, Jun. 2021.
    [Pdf] | [Bib]
  81. [CCS'21] CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
  82. Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
    ACM Conference on Computer and Communications Security, Virtual, Nov. 2021.
    Best Paper Award Runner-up
    [Pdf] | [Bib]
  83. [CCS'20] FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware
  84. Haohuang Wen, Zhiqiang Lin, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Nov. 2020.
    [Pdf] | [Bib]
  85. [Security'20] TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
  86. Mengya Zhang, Xiaokuan Zhang, Yinqian Zhang, Zhiqiang Lin
    USENIX Security Symposium, Aug. 2020.
    [Pdf] | [Bib]
  87. [S&P'20] SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation
  88. Zhe Wang, Chenggang Wu, Mengyao Xie, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yang Kang, Min Yang
    IEEE Symposium on Security and Privacy, May 2020.
    [Pdf] | [Bib]
  89. [NDSS'20] SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
  90. Yuan Xiao, Yinqian Zhang, Mircea-Radu Teodorescu
    Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2020.
    [Pdf] | [Bib]
  91. [CCS'19] OPERA: Open Remote Attestation for Intel’s Secure Enclaves
  92. Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai
    ACM Conference on Computer and Communications Security, London, UK, Nov. 2019.
    [Pdf] | [Bib]
  93. [CCS'19] Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps
  94. Chaoshun Zuo, Haohuang Wen, Zhiqiang Lin, Yinqian Zhang
    ACM Conference on Computer and Communications Security, London, UK, Nov. 2019.
    [Pdf] | [Bib]
  95. [Security'19] Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization
  96. Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
    USENIX Security Symposium, Santa Clara, CA, Aug. 2019.
    [Pdf] | [Bib] | [Presentation]
  97. [Security'19] SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization
  98. Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, and Zhiping Shi
    USENIX Security Symposium, Santa Clara, CA, Aug. 2019.
    [Pdf] | [Bib] | [Slides]
  99. [NDSS'19] Statistical Privacy for Streaming Traffic
  100. Xiaokuan Zhang, Jihun Hamm, Michael K. Reiter, Yinqian Zhang
    Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019.
    [Pdf] | [Bib]
  101. [NDSS'19] OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX
  102. Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, and Byoungyoung Lee
    Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2019.
    [Pdf] | [Bib]
  103. [S&P'19] Why Does Your Data Leak? Uncovering the Data Leakage in Cloud From Mobile Apps
  104. Chaoshun Zuo, Zhiqiang Lin, and Yinqian Zhang.
    IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2019.
    [Pdf] | [Bib] | [Slides]
  105. [CCS'18] HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
  106. Wei Zhang, Yan Meng, Yugeng Liu, Xiaokuan Zhang, Yinqian Zhang, Haojin Zhu
    ACM Conference on Computer and Communications Security, Toronto, Canada, Oct. 2018.
    [Pdf] | [Bib]
  107. [S&P'18] Static Evaluation of Noninterference Using Approximate Model Counting
  108. Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang
    IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2018.
    [Pdf] | [Bib]
  109. [S&P'18] Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
  110. Guoxing Chen*, Wenhao Wang*, Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin
    IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2018. (* co-first authors)
    [Pdf] | [Bib]
  111. [INFOCOM'18] Differentially Private Access Patterns for Searchable Symmetric Encryption
  112. Guoxing Chen, Ten H. Lai, Michael Reiter, Yinqian Zhang
    IEEE International Conference on Computer Communications, Honolulu, HI, USA, Apr. 15-19, 2018.
    [Pdf] | [Bib]| [Source code]
  113. [NDSS'18] OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS
  114. Xiaokuan Zhang, Xueqiang Wang, Xiaolong Bai, Yinqian Zhang, Xiaofeng Wang
    Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2018.
    Top 10 Finalists of CSAW Best Applied Research Paper Award
    [Pdf] | [Bib] | [Video]
  115. [NDSS'18] Face Flashing: A Secure Liveness Detection Protocol based on Light Reflections
  116. Di Tang, Zhe Zhou, Yinqian Zhang, Kehuan Zhang
    Network and Distributed System Security Symposium, San Diego, CA, USA, Feb. 2018.
    [Pdf] | [Bib]
  117. [INFOCOM'18] Differentially Private Access Patterns for Searchable Symmetric Encryption
  118. Guoxing Chen, Ten H. Lai, Michael Reiter, Yinqian Zhang
    IEEE International Conference on Computer Communications, Honolulu, HI, USA, Apr. 2018.
    [Pdf] | [Bib]| [Source code]
  119. [ATC'18] Peeking Behind the Curtains of Serverless Platforms
  120. Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael Swift
    Usenix Annual Technical Conference, Boston, MA, USA, Jul. 2018.
    [Pdf] | [Bib]
  121. [CCS'17] Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
  122. Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Dallas, Texas, USA, Oct. 2017.
    (The CCS version of this paper supersedes arxiv 1707.03473.)
    [Pdf] | [Bib] | [Slides] | [Project Homepage]
  123. [CCS'17] Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
  124. Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
    ACM Conference on Computer and Communications Security, Dallas, Texas, USA, Oct. 2017.
    (The CCS version of this paper supersedes arxiv 1705.07289.)
    [Pdf] | [Bib]
  125. [CCS'16] Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
  126. Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Vienna, Austria, Oct. 2016.
    [Pdf] | [Bib] | [Slides]
  127. [CCS'16] A Software Approach to Defeating Side Channels in Last-Level Caches
  128. Ziqiao Zhou, Michael K. Reiter, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Vienna, Austria, Oct. 2016.
    (The CCS version of this paper supersedes arxiv 1603.05615.)
    [Pdf] | [Bib]
  129. [Security'16] One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
  130. Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Mircea-Radu Teodorescu
    USENIX Security Symposium, Austin, TX, Aug. 2016.
    Top 10 Finalists of CSAW Best Applied Research Paper Award
    [Pdf] | [Bib] | [Slides]
  131. [CCS'15] Mitigating Storage Side Channels Using Statistical Privacy Mechanisms
  132. Qiuyu Xiao, Michael K. Reiter, Yinqian Zhang
    ACM Conference on Computer and Communications Security, Denver, Colorado, Oct. 2015.
    [Pdf] | [Bib]
  133. [Security'15] A Placement Vulnerability Study in Multi-Tenant Public Clouds
  134. Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart and Michael Swift
    USENIX Security Symposium, Washington, D.C., Aug. 2015.
    [Pdf] | [Bib]
  135. [CCS'14] Cross-Tenant Side-Channel Attacks in PaaS Clouds
  136. Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
    ACM Conference on Computer and Communications Security, Scottsdale, AZ, Nov. 2014.
    [Pdf] | [Bib]
  137. [CCS'13] Düppel: Retrofitting Commodity Operating Systems to Mitigate Cache Side Channels in the Cloud
  138. Yinqian Zhang, Michael K. Reiter
    ACM Conference on Computer and Communications Security, Berlin, Germany, Nov. 2013.
    [Pdf] | [Bib]
  139. [CCS'12] Cross-VM Side Channels and Their Use to Extract Private Keys
  140. Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart
    ACM Conference on Computer and Communications Security, Raleigh, NC, Oct. 2012.
    ACM CCS Test-of-Time Award
    [Pdf] | [Bib] | [Slides]
  141. [S&P'11] HomeAlone: Co-Residency Detection in the Cloud via Side-Channel Analysis
  142. Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter
    IEEE Symposium on Security and Privacy, Oakland, CA, May 2011.
    [Pdf] | [Bib]
  143. [CCS'10] The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis
  144. Yinqian Zhang, Fabian Monrose, Michael K. Reiter
    ACM Conference on Computer and Communications Security, Chicago, IL, Oct. 2010.
    [Pdf] | [Bib]


    Journal Papers

  145. [TC] TeeRollup: Efficient Rollup Design Using Heterogeneous TEE
  146. Xiaoqing Wen, Quanbi Feng, Hanzheng Lyu, Jianyu Niu, Yinqian Zhang, Chen Feng
    IEEE Transactions on Computers
  147. [TDSC] CAPE: Commitment-based Privacy-Preserving Payment Channel Scheme in Blockchain
  148. Keke Gai, Yunwei Guo, Jing Yu, Weilin Chan, Liehuang Zhu, Yinqian Zhang
    IEEE Transactions on Dependable and Secure Computing, Early Access.
    [Link] | [Bib]
  149. [TDSC] Chained HotStuff Under Performance Attack
  150. Jianyu Niu, Minjie Wang, Fangyu Gai, Mohammad M. Jalalzai, Chen Feng, Yinqian Zhang
    IEEE Transactions on Dependable and Secure Computing, Early Access.
    [Link] | [Bib]
  151. [TDSC] Ensuring State Continuity for Confidential Computing: A Blockchain-based Approach
  152. Wei Peng, Xiang Li, Jianyu Niu, Xiaokuan Zhang, Yinqian Zhang
    Transactions on Dependable and Secure Computing, Publication Mar. 26 2024, Volume 26, Issue 6.
    [Link] | [Bib]
  153. [TCAD] SPECWANDS: An Efficient Priority-based Scheduler Against Speculation Contention Attacks
  154. Bowen Tang, Chenggang Wu, Pen-Chung Yew, Yinqian Zhang, Mengyao Xie, Yuanming Lai, Yan Kang, Wei Wang, Qiang Wei, Zhe Wang
    IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems , Publication Jun. 8, 2023, Volume 42, Issue 12.
    [Link] | [Bib]
  155. [TDSC] VERITRAIN: Validating MLaaS Training Efforts via Anomaly Detection
  156. Xiaokuan Zhang, Yang Zhang, Yinqian Zhang
    Transactions on Dependable and Secure Computing, Publication Apr. 12, 2023, Volume 21, Issue 3.
    [Link] | [Bib]
  157. [TDSC] Crystal: Enhancing Blockchain Mining Transparency with Quorum Certificate
  158. Jianyu Niu, Fangyu Gai, Runchao Han, Ren Zhang, Yinqian Zhang, Chen Feng
    Transactions on Dependable and Secure Computing, Publication Oct. 25, 2022, Volume 20, Issue 5.
    [Link] | [Bib]
  159. [TDSC] Securing TEEs with Verifiable Execution Contracts
  160. Guoxing Chen, Yinqian Zhang
    Transactions on Dependable and Secure Computing, Publication Jul. 29, 2022, Volume 20, Issue 4.
    [Link] | [Bib]
  161. [TDSC] Dancing with Wolves: An Intra-process Isolation Technique with Privileged Hardware
  162. Chenggang Wu, Mengyao Xie, Zhe Wang, Yinqian Zhang, Kangjie Lu, Xiaofeng Zhang, Yuanming Lai, Yan Kang, Min Yang, Tao Li
    Transactions on Dependable and Secure Computing, Publication Apr. 19, 2022, Volume 20, Issue 3.
    [Link] | [Bib]
  163. [TDSC] SPECBOX: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks
  164. Bowen Tang, Chenggang Wu, Zhe Wang, Lichen Jia, Pen-Chung Yew, Yueqiang Cheng, Yinqian Zhang, Chenxi Wang, Guoqing Harry Xu
    Transactions on Dependable and Secure Computing, Publication Jan. 21, 2022, Volume 20, Issue 1.
    [Link] | [Bib]
  165. [TDSC] Making Information Hiding Effective Again
  166. Zhe Wang, Chenggang Wu, Yinqian Zhang, Bowen Tang, Pen-Chung Yew, Mengyao Xie, Yuanming Lai, Yan Kang, Yueqiang Cheng, Zhiping Shi
    Transactions on Dependable and Secure Computing, Publication Mar. 5, 2021, Volume 19, Issue 4.
    [Link]|[Bib]
  167. [TDSC] CPU Elasticity to Mitigate Cross-VM Runtime Monitoring
  168. Zeyu Mi, Haibo Chen, Yinqian Zhang, Shuanghe Peng, Xiaofeng Wang, and Michael Reiter
    Transactions on Dependable and Secure Computing, Publication Jun. 13, 2018, Volume 17, Issue 5.
    [Pdf] | [Bib]