Yinqian Zhang

Orcid: 0000-0002-7585-1075

According to our database1, Yinqian Zhang authored at least 114 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VeriTrain: Validating MLaaS Training Efforts via Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2024

Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach.
IEEE Trans. Dependable Secur. Comput., 2024

TeeRollup: Efficient Rollup Design Using Heterogeneous TEE.
CoRR, 2024

MECURY: Practical Cross-Chain Exchange via Trusted Hardware.
CoRR, 2024

Ladon: High-Performance Multi-BFT Consensus via Dynamic Global Ordering (Extended Version).
CoRR, 2024

pi-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking.
Proceedings of the 33rd USENIX Security Symposium, 2024

HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64.
Proceedings of the 33rd USENIX Security Symposium, 2024

SoK: Opportunities for Accelerating Multi - Party Computation via Trusted Hardware.
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024

Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
Proceedings of the 27th International Symposium on Research in Attacks, 2024

Uncovering and Exploiting AMD Speculative Memory Access Predictors for Fun and Profit.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2024

Formally Verifying a Rollback-Prevention Protocol for TEEs.
Proceedings of the Formal Techniques for Distributed Objects, Components, and Systems, 2024

SAEG: Stateful Automatic Exploit Generation.
Proceedings of the Computer Security - ESORICS 2024, 2024

ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Proceedings of the Computer Security - ESORICS 2024, 2024

HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Framekernel: A Safe and Efficient Kernel Architecture via Rust-based Intra-kernel Privilege Separation.
Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems, 2024

2023
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware.
IEEE Trans. Dependable Secur. Comput., 2023

SpecBox: A Label-Based Transparent Speculation Scheme Against Transient Execution Attacks.
IEEE Trans. Dependable Secur. Comput., 2023

Crystal: Enhancing Blockchain Mining Transparency With Quorum Certificate.
IEEE Trans. Dependable Secur. Comput., 2023

Securing TEEs With Verifiable Execution Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing.
IEEE Trans. Cloud Comput., 2023

SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems.
CoRR, 2023

Panda: Security Analysis of Algorand Smart Contracts.
Proceedings of the 32nd USENIX Security Symposium, 2023

CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Proceedings of the 32nd USENIX Security Symposium, 2023

Controlled Data Races in Enclaves: Attacks and Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

Reusable Enclaves for Confidential Serverless Computing.
Proceedings of the 32nd USENIX Security Symposium, 2023

TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments.
Proceedings of the 50th Annual International Symposium on Computer Architecture, 2023

PwrLeak: Exploiting Power Reporting Interface for Side-Channel Attacks on AMD SEV.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

PANIC: PAN-assisted Intra-process Memory Isolation on ARM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Making Information Hiding Effective Again.
IEEE Trans. Dependable Secur. Comput., 2022

Defeating traffic analysis via differential privacy: a case study on streaming traffic.
Int. J. Inf. Sec., 2022

Cloud Computing Security: Foundations and Research Directions.
Found. Trends Priv. Secur., 2022

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography.
ACM Comput. Surv., 2022

An Empirical Study on Ethereum Private Transactions and the Security Implications.
CoRR, 2022

A Pre-Silicon Approach to Discovering Microarchitectural Vulnerabilities in Security Critical Applications.
IEEE Comput. Archit. Lett., 2022

MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties.
Proceedings of the 31st USENIX Security Symposium, 2022

vSGX: Virtualizing SGX Enclaves on AMD SEV.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX.
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022

Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Cape: compiler-aided program transformation for HTM-based cache side-channel defense.
Proceedings of the CC '22: 31st ACM SIGPLAN International Conference on Compiler Construction, Seoul, South Korea, April 2, 2022

2021
When NAS Meets Watermarking: Ownership Verification of DNN Models via Cache Side Channels.
CoRR, 2021

CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.
Proceedings of the 30th USENIX Security Symposium, 2021

Towards Formal Verification of State Continuity for Enclave Programs.
Proceedings of the 30th USENIX Security Symposium, 2021

SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting.
Proceedings of the 30th USENIX Security Symposium, 2021

INTROSPECTRE: A Pre-Silicon Framework for Discovery and Analysis of Transient Execution Vulnerabilities.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

Specularizer : Detecting Speculative Execution Attacks via Performance Tracing.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
CPU Elasticity to Mitigate Cross-VM Runtime Monitoring.
IEEE Trans. Dependable Secur. Comput., 2020

SgxPectre: Stealing Intel Secrets From SGX Enclaves via Speculative Execution.
IEEE Secur. Priv., 2020

GhostKnight: Breaching Data Integrity via Speculative Execution.
CoRR, 2020

TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Proceedings of the 29th USENIX Security Symposium, 2020

SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

CCSW'20: 2020 Cloud Computing Security Workshop.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Revisiting and Evaluating Software Side-channel Vulnerabilities and Countermeasures in Cryptographic Applications.
CoRR, 2019

SvTPM: A Secure and Efficient vTPM in the Cloud.
CoRR, 2019

Isolating Speculative Data to Prevent Transient Execution Attacks.
IEEE Comput. Archit. Lett., 2019

SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Proceedings of the 28th USENIX Security Symposium, 2019

Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Statistical Privacy for Streaming Traffic.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Defeating Speculative-Execution Attacks on SGX with HyperRace.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Speculative Execution Attacks and Cloud Security.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

OPERA: Open Remote Attestation for Intel's Secure Enclaves.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

SpecShield: Shielding Speculative Data from Microarchitectural Covert Channels.
Proceedings of the 28th International Conference on Parallel Architectures and Compilation Techniques, 2019

2018
SgxPectre Attacks: Leaking Enclave Secrets via Speculative Execution.
CoRR, 2018

Peeking Behind the Curtains of Serverless Platforms.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Static Evaluation of Noninterference Using Approximate Model Counting.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Differentially Private Access Patterns for Searchable Symmetric Encryption.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

NVCool: When Non-Volatile Caches Meet Cold Boot Attacks.
Proceedings of the 36th IEEE International Conference on Computer Design, 2018

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Analyzing Cache Side Channels Using Deep Neural Networks.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
Personalized Pseudonyms for Servers in the Cloud.
Proc. Priv. Enhancing Technol., 2017

PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

DoS Attacks on Your Memory in Cloud.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Cache Side Channels: State of the Art and Research Opportunities.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Memory DoS Attacks in Multi-tenant Clouds: Severity and Mitigation.
CoRR, 2016

One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation.
Proceedings of the 25th USENIX Security Symposium, 2016

CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

A Software Approach to Defeating Side Channels in Last-Level Caches.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Placement Vulnerability Study in Multi-Tenant Public Clouds.
Proceedings of the 24th USENIX Security Symposium, 2015

Mitigating Storage Side Channels Using Statistical Privacy Mechanisms.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Cross-VM side channels and their use to extract private keys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Weight in Competitive K-Means Algorithm.
Proceedings of the Frontiers in Computer Education [International Conference on Frontiers in Computer Education, 2011

2010
The security of modern password expiration: an algorithmic framework and empirical analysis.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
Two Stochastic Models for Security Evaluation Based on Attack Graph.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

An Easy-to-Deploy Penetration Testing Platform.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008


  Loading...