Passive Attacks Against Searchable Encryption.
Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang: Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019)
View ArticleAnalysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem.
Liang Dong, Hongxin Zhang, Lei Zhu, Shaofei Sun, Han Gan, Fan Zhang: Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem. IEEE Access 7: 31656-31662 (2019)
View ArticleA Framework of Private Set Intersection Protocols.
Ziyuan Liang, Weiran Liu, Fan Zhang, Bingsheng Zhang, Jian Liu, Lei Zhang, Kui Ren: A Framework of Private Set Intersection Protocols. IACR Cryptol. ePrint Arch. 2020: 1541 (2020)
View ArticleTowards Understanding and Demystifying Bitcoin Mixing Services.
Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren: Towards Understanding and Demystifying Bitcoin Mixing Services. CoRR abs/2010.16274 (2020)
View ArticleActive Fuzzing for Testing and Securing Cyber-Physical Systems.
Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang: Active Fuzzing for Testing and Securing Cyber-Physical Systems. CoRR abs/2005.14124 (2020)
View ArticleDefending Model Inversion and Membership Inference Attacks via Prediction...
Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, Fan Zhang: Defending Model Inversion and Membership Inference Attacks via Prediction Purification. CoRR abs/2005.03915 (2020)
View ArticleActive fuzzing for testing and securing cyber-physical systems.
Yuqi Chen, Bohan Xuan, Christopher M. Poskitt, Jun Sun, Fan Zhang: Active fuzzing for testing and securing cyber-physical systems. ISSTA 2020: 14-26
View ArticleFrom Homogeneous to Heterogeneous: Leveraging Deep Learning based Power...
Fan Zhang, Bin Shao, Guorui Xu, Bolin Yang, Ziqi Yang, Zhan Qin, Kui Ren: From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices. DAC 2020: 1-6
View ArticleImperceptible Misclassification Attack on Deep Learning Accelerator by Glitch...
Wenye Liu, Chip-Hong Chang, Fan Zhang, Xiaoxuan Lou: Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection. DAC 2020: 1-6
View ArticleA Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay...
Fan Zhang, Xiaofei Dong, Bolin Yang, Yajin Zhou, Kui Ren: A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures. IEEE Trans. Inf. Forensics Secur. 15: 1407-1422 (2020)
View ArticlePersistent Fault Attack in Practice.
Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren: Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195...
View ArticleA Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer...
Changhai Ou, Siew-Kei Lam, Chengju Zhou, Guiyuan Jiang, Fan Zhang: A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks. IEEE Trans. Computers 69(11): 1694-1706 (2020)
View ArticleSide-Channel Analysis and Countermeasure Design on ARM-Based...
Fan Zhang, Bolin Yang, Xiaofei Dong, Sylvain Guilley, Zhe Liu, Wei He, Fangguo Zhang, Kui Ren: Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE. IEEE Trans. Computers...
View ArticleTheoretical analysis of persistent fault attack.
Fan Zhang, Guorui Xu, Bolin Yang, Ziyuan Liang, Kui Ren: Theoretical analysis of persistent fault attack. Sci. China Inf. Sci. 63(3) (2020)
View ArticleTowards Understanding and Demystifying Bitcoin Mixing Services.
Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, Kui Ren: Towards Understanding and Demystifying Bitcoin Mixing Services. WWW 2021: 33-44
View ArticleStealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for...
Wenye Liu, Chip-Hong Chang, Fan Zhang: Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint. IEEE Trans. Inf. Forensics Secur. 16: 1928-1942...
View ArticlehPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning, Jun Sun, Joseph K. Liu, Yibao Bao: hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave. IEEE Trans. Comput. Aided...
View ArticlePushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers.
Guorui Xu, Fan Zhang, Bolin Yang, Xinjie Zhao, Wei He, Kui Ren: Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst....
View ArticleDesign and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis...
Fan Zhang, Bolin Yang, Bojie Yang, Yiran Zhang, Xuanle Ren, Shivam Bhasin, Kui Ren: Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level. IEEE Trans. Comput....
View ArticleG2F: A Secure User Authentication for Rapid Smart Home IoT Management.
Hongwei Luo, Chao Wang, Hao Luo, Fan Zhang, Feng Lin, Guoai Xu: G2F: A Secure User Authentication for Rapid Smart Home IoT Management. IEEE Internet Things J. 8(13): 10884-10895 (2021)
View ArticleFiddling the Twiddle Constants - Fault Injection Analysis of the Number...
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay: Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. IACR Cryptol. ePrint Arch. 2022:...
View ArticleSnowball: Another View on Side-Channel Key Recovery Tools.
Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam: Snowball: Another View on Side-Channel Key Recovery Tools. IACR Cryptol. ePrint Arch. 2022: 728 (2022)
View ArticlePurifier: Defending Data Inference Attacks via Transforming Confidence Scores.
Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. CoRR abs/2212.00612 (2022)
View ArticleFakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in...
Aditya Singh Rathore, Yijie Shen, Chenhan Xu, Jacob Snyderman, Jinsong Han, Fan Zhang, Zhengxiong Li, Feng Lin, Wenyao Xu, Kui Ren: FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in...
View ArticleTerminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV...
Junge Xu, Bohan Xuan, Anlin Liu, Mo Sun, Fan Zhang, Zeke Wang, Kui Ren: Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection. DAC 2022: 685-690
View ArticleDARPT: defense against remote physical attack based on TDC in multi-tenant...
Fan Zhang, Zhiyong Wang, Haoting Shen, Bolin Yang, Qianmei Wu, Kui Ren: DARPT: defense against remote physical attack based on TDC in multi-tenant scenario. DAC 2022: 559-564
View ArticleOn Efficient and Secure Code-based Masking: A Pragmatic Evaluation.
Qianmei Wu, Wei Cheng, Sylvain Guilley, Fan Zhang, Wei Fu: On Efficient and Secure Code-based Masking: A Pragmatic Evaluation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 192-222 (2022)
View ArticleFree Fault Leakages for Deep Exploitation: Algebraic Persistent Fault...
Fan Zhang, Tianxiang Feng, Zhiqi Li, Kui Ren, Xinjie Zhao: Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers. IACR Trans. Cryptogr. Hardw....
View ArticleWavesdropper: Through-wall Word Detection of Human Speech via Commercial...
Chao Wang, Feng Lin, Zhongjie Ba, Fan Zhang, Wenyao Xu, Kui Ren: Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous...
View ArticleAflIot: Fuzzing on linux-based IoT device with binary-level instrumentation.
Xuechao Du, Andong Chen, Boyuan He, Hao Chen, Fan Zhang, Yan Chen: AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation. Comput. Secur. 122: 102889 (2022)
View ArticleSTAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber.
Bolin Yang, Prasanna Ravi, Fan Zhang, Ao Shen, Shivam Bhasin: STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber. IACR Cryptol. ePrint Arch. 2023: 1184 (2023)
View ArticleDLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers.
Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng: DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 21 (2023)
View ArticleWork-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches...
Ziming Zhao, Zhaoxuan Li, Zhuoxue Song, Fan Zhang: Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach. RTSS 2023: 431-434
View ArticleInfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Peng Huang, Yao Wei, Peng Cheng, Zhongjie Ba, Li Lu, Feng Lin, Fan Zhang, Kui Ren: InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise. NDSS 2023
View ArticleGameRTS: A Regression Testing Framework for Video Games.
Jiongchi Yu, Yuechen Wu, Xiaofei Xie, Wei Le, Lei Ma, Yingfeng Chen, Jingyu Hu, Fan Zhang: GameRTS: A Regression Testing Framework for Video Games. ICSE 2023: 1393-1404
View ArticleStalker: A Framework to Analyze Fragility of Cryptographic Libraries under...
Guorui Xu, Fan Zhang, Xinjie Zhao, Yuan Chen, Shize Guo, Kui Ren: Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models. DAC 2023: 1-6
View ArticlePoster: Detecting Adversarial Examples Hidden under Watermark Perturbation...
Ziming Zhao, Zhaoxuan Li, Tingting Li, Zhuoxue Song, Fan Zhang, Rui Zhang: Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory. CCS 2023: 3636-3638
View ArticlePurifier: Defending Data Inference Attacks via Transforming Confidence Scores.
Ziqi Yang, Lijin Wang, Da Yang, Jie Wan, Ziming Zhao, Ee-Chien Chang, Fan Zhang, Kui Ren: Purifier: Defending Data Inference Attacks via Transforming Confidence Scores. AAAI 2023: 10871-10879
View ArticleVulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via...
Zhaoxuan Li, Siqi Lu, Rui Zhang, Ziming Zhao, Rujin Liang, Rui Xue, Wenhao Li, Fan Zhang, Sheng Gao: VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning....
View ArticleConstructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing.
Fan Zhang, Qianmei Wu, Bohan Xuan, Yuqi Chen, Wei Lin, Christopher M. Poskitt, Jun Sun, Binbin Chen: Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing. IEEE Trans. Software...
View ArticleSAGE: Steering the Adversarial Generation of Examples With Accelerations.
Ziming Zhao, Zhaoxuan Li, Fan Zhang, Ziqi Yang, Shuang Luo, Tingting Li, Rui Zhang, Kui Ren: SAGE: Steering the Adversarial Generation of Examples With Accelerations. IEEE Trans. Inf. Forensics Secur....
View ArticleRAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation...
Zehong (Zephyr) Qiu, Fan Zhang: RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 570-596 (2023)
View ArticleEfficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.
Fan Zhang, Run Huang, Tianxiang Feng, Xue Gong, Yulong Tao, Kui Ren, Xinjie Zhao, Shize Guo: Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts. IACR Trans. Cryptogr. Hardw....
View ArticleFiddling the Twiddle Constants - Fault Injection Analysis of the Number...
Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay: Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform. IACR Trans. Cryptogr. Hardw....
View ArticleCoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.
Changhai Ou, Debiao He, Kexin Qiao, Shihui Zheng, Siew-Kei Lam, Fan Zhang: CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space. IEEE Trans. Comput. Aided Des. Integr. Circuits...
View ArticleExtending the classical side-channel analysis framework to access-driven...
Pengfei Guo, Yingjian Yan, Fan Zhang, Chunsheng Zhu, Lichao Zhang, Zibin Dai: Extending the classical side-channel analysis framework to access-driven cache attacks. Comput. Secur. 129: 103255 (2023)
View ArticleFaultMorse: An automated controlled-channel attack via longest recurring...
Lifeng Hu, Fan Zhang, Ziyuan Liang, Ruyi Ding, Xingyu Cai, Zonghui Wang, Wenguang Jin: FaultMorse: An automated controlled-channel attack via longest recurring sequence. Comput. Secur. 124: 103003 (2023)
View ArticleDDoS family: A novel perspective for massive types of DDoS attacks.
Ziming Zhao, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang, Rui Zhang: DDoS family: A novel perspective for massive types of DDoS attacks. Comput. Secur. 138: 103663 (2024)
View ArticleCMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware...
Ziming Zhao, Zhaoxuan Li, Jiongchi Yu, Fan Zhang, Xiaofei Xie, Haitao Xu, Binbin Chen: CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains. IEEE Trans. Mob. Comput....
View ArticleSHAPER: A General Architecture for Privacy-Preserving Primitives in Secure...
Ziyuan Liang, Qi'ao Jin, Zhiyong Wang, Zhaohui Chen, Zhen Gu, Yanheng Lu, Fan Zhang: SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning. IACR Trans. Cryptogr....
View Article
More Pages to Explore .....