Obserwuj
Zihao Zhan
Zihao Zhan
Assistant Professor, Texas Tech University
Zweryfikowany adres z ttu.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Leveraging em side-channel information to detect rowhammer attacks
Z Zhang, Z Zhan, D Balasubramanian, B Li, P Volgyesi, X Koutsoukos
2020 IEEE Symposium on Security and Privacy (SP), 729-746, 2020
512020
Triggering rowhammer hardware faults on arm: A revisit
Z Zhang, Z Zhan, D Balasubramanian, X Koutsoukos, G Karsai
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware …, 2018
432018
Bitjabber: The world’s fastest electromagnetic covert channel
Z Zhan, Z Zhang, X Koutsoukos
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
372020
Graphics peeping unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors
Z Zhan, Z Zhang, S Liang, F Yao, X Koutsoukos
2022 IEEE Symposium on Security and Privacy (SP), 1440-1457, 2022
352022
Invisible finger: Practical electromagnetic interference attack on touchscreen-based electronic devices
H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin
2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022
342022
Clairvoyance: exploiting far-field em emanations of gpu to" see" your dnn models through obstacles at a distance
S Liang, Z Zhan, F Yao, L Cheng, Z Zhang
2022 IEEE Security and Privacy Workshops (SPW), 312-322, 2022
112022
A high-speed, long-distance and wall-penetrating covert channel based on em emanations from dram clock
Z Zhan, Z Zhang, X Koutsoukos
Journal of Hardware and Systems Security 6 (1), 47-65, 2022
62022
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices
H Wang, Z Zhan, H Shan, S Dai, M Panoff, S Wang
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024
22024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Z Zhan, Y Yang, H Shan, H Wang, Y Jin, S Wang
33rd USENIX Security Symposium (USENIX Security 24), 3979-3995, 2024
22024
Programmable EM Sensor Array for Golden-Model Free Run-Time Trojan Detection and Localization
H Wang, M Panoff, Z Zhan, S Wang, C Bobda, D Forte
2024 Design, Automation & Test in Europe Conference & Exhibition (DATE), 1-6, 2024
12024
A Privacy Leakage Issue in Qi-compatible Cellphone Wireless Charging by Stray Magnetic Field Sniffing
Y Yang, Z Zhan, H Yu, Q Huang, S Wang
2024 IEEE Applied Power Electronics Conference and Exposition (APEC), 2870-2876, 2024
12024
New Attacks and Defenses Leveraging Electromagnetic Side-Channel Information
Z Zhan
Vanderbilt University, 2021
2021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–12