Ziming Zhao

Orcid: 0000-0002-4930-5556

Affiliations:
  • Northeastern University, CactiLab, Boston, MA, USA (since 2024)
  • University at Buffalo, NY, USA (2020-2024)
  • Rochester Institute of Technology, Henrietta, NY, USA (2018-2020)
  • Arizona State University, Tempe, AZ, USA (2009-2018)


According to our database1, Ziming Zhao authored at least 100 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024

Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024

Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
CoRR, 2024

SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems.
Proceedings of the 18th USENIX WOOT Conference on Offensive Technologies, 2024

Unveiling IoT Security in Reality: A Firmware-Centric Journey.
Proceedings of the 33rd USENIX Security Symposium, 2024

Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Trusted Execution Environments in Embedded and IoT Systems: A CactiLab Perspective.
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024

Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024

InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System.
Proceedings of the 30th IEEE Real-Time and Embedded Technology and Applications Symposium, 2024

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Building Your Own Trusted Execution Environments Using FPGA.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence.
Inf. Syst. Frontiers, April, 2023

FIDO Gets Verified: A Formal Analysis of the Universal Authentication Framework Protocol.
IEEE Trans. Dependable Secur. Comput., 2023

xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses.
Proceedings of the 32nd USENIX Security Symposium, 2023

Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

An Investigation of Large Language Models for Real-World Hate Speech Detection.
Proceedings of the International Conference on Machine Learning and Applications, 2023

Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023

2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022

SoK: On the Semantic AI Security in Autonomous Driving.
CoRR, 2022

BYOTee: Towards Building Your Own Trusted Execution Environments Using FPGA.
CoRR, 2022

A Formal Analysis of the FIDO2 Protocols.
Proceedings of the Computer Security - ESORICS 2022, 2022

Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Understanding and Detecting Remote Infection on Linux-based IoT Devices.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021

<i>ExSol</i>: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
DTRAP, 2021

Understanding and Measuring Robustness of Multimodal Learning.
CoRR, 2021

Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
Proceedings of the 30th USENIX Security Symposium, 2021

A Formal Analysis of the FIDO UAF Protocol.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

Toward Automated Enforcement of Cyber-Physical Security Requirements for Energy Delivery Systems.
Proceedings of the Second IEEE International Conference on Trust, 2020

SmokeBomb: effective mitigation against cache side-channel attacks on the ARM architecture.
Proceedings of the MobiSys '20: The 18th Annual International Conference on Mobile Systems, 2020

DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Towards a reliable firewall for software-defined networks.
Comput. Secur., 2019

Users Really Do Answer Telephone Scams.
Proceedings of the 28th USENIX Security Symposium, 2019

Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

iCore: continuous and proactive extrospection on multi-core IoT devices.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

ExSol: Collaboratively Assessing Cybersecurity Risks for Protecting Energy Delivery Systems.
Proceedings of the 7th Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2019

Understanding and Predicting Private Interactions in Underground Forums.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Advances in Infrastructure Mobility for Future Networks.
Wirel. Commun. Mob. Comput., 2018

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
IEEE Trans. Inf. Forensics Secur., 2018

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Measuring E-mail header injections on the world wide web.
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018

Challenges, Opportunities and a Framework for Web Environment Forensics.
Proceedings of the Advances in Digital Forensics XIV, 2018

Secure Display for FIDO Transaction Confirmation.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Challenges and Preparedness of SDN-based Firewalls.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

The Danger of Missing Instructions: A Systematic Analysis of Security Requirements for MCPS.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

CacheLight: Defeating the CacheKit Attack.
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, 2018

AIM-SDN: Attacking Information Mismanagement in SDN-datastores.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
E-mail Header Injection Vulnerabilities.
it Inf. Technol., 2017

Toward Standardization of Authenticated Caller ID Transmission.
IEEE Commun. Stand. Mag., 2017

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

NIVAnalyzer: A Tool for Automatically Detecting and Verifying Next-Intent Vulnerabilities in Android Apps.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

OntoEDS: Protecting Energy Delivery Systems by Collaboratively Analyzing Security Requirements.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Deep Android Malware Detection.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

HoneyProxy: Design and implementation of next-generation honeynet via SDN.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

2016
TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
J. Comput. Secur., 2016

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.
IEEE Secur. Priv., 2016

dbling: Identifying extensions installed on encrypted web thin clients.
Digit. Investig., 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games.
CoRR, 2016

SoK: Everyone Hates Robocalls: A Survey of Techniques Against Telephone Spam.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

State-aware Network Access Management for Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Toward authenticated caller ID transmission: The need for a standardized authentication scheme in Q.731.3 calling line identification presentation.
Proceedings of the 2016 ITU Kaleidoscope: ICTs for a Sustainable World, 2016

Toward Discovering and Exploiting Private Server-Side Web APIs.
Proceedings of the IEEE International Conference on Web Services, 2016

Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin.
Proceedings of the 2016 APWG Symposium on Electronic Crime Research, 2016

Towards Automated Threat Intelligence Fusion.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Position Paper: Towards a Moving Target Defense Approach for Attribute-based Access Control.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

HoneyMix: Toward SDN-based Intelligent Honeynet.
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016

Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015

Towards Automated Risk Assessment and Mitigation of Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2015

Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Toward a Moving Target Defense for Web Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
Discovering and Using Patterns for Countering Security Challenges.
PhD thesis, 2014

FLOWGUARD: building robust firewalls for software-defined networks.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Game theoretic analysis of multiparty access control in online social networks.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards a Reliable SDN Firewall.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

RiskMon: continuous and automated risk assessment of mobile applications.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Morpheus: automatically generating heuristics to detect Android emulators.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
On the Security of Picture Gesture Authentication.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Using instruction sequence abstraction for shellcode detection and attribution.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Risk-Aware Mitigation for MANET Routing Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

SocialImpact: Systematic Analysis of Underground Social Dynamics.
Proceedings of the Computer Security - ESORICS 2012, 2012

2011
Automatic Extraction of Secrets from Malware.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Examining Social Dynamics for Countering Botnet Attacks.
Proceedings of the Global Communications Conference, 2011

2010
Risk-Aware Response for Mitigating MANET Routing Attacks.
Proceedings of the Global Communications Conference, 2010

2008
An Efficient Remote User Authentication Scheme with Strong Anonymity.
Proceedings of the International Conference on Cyberworlds 2008, 2008


  Loading...