Publications

2021

  • [NDSS'21] Zhenxiao Qi, Qian Feng, Yueqiang Cheng, Mengjia Yan, Peng Li, Heng Yin, and Tao Wei. SpecTaint: Speculative Taint Analysis for Discovering Spectre Gadgetsn, to appear in the 30th USENIX Security Symposium(NDSS), August 2021.

  • [NDSS'21] Jinghan Wang, Chengyu Song, and Heng Yi. Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing, to appear in the Network and Distributed System Security Symposium(NDSS), February 2021.

  • [USENIX Security'21] Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger. PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems, in Proceedings of USENIX Security 2021.

  • [USENIX Security'21] Seyed Mohammadjavad Seyed Talebi, Zhihao Yao, Ardalan Amiri Sani, Zhiyun Qian, Daniel Austin. Undo Workarounds for Kernel Bugs, in Proceedings of USENIX Security 2021.

  • [USENIX Security'21] Zheng Zhang, Hang Zhang, Zhiyun Qian, Billy Lau. An Investigation of the Android Kernel Patch Ecosystem, in Proceedings of USENIX Security 2021.

  • [HPCA'21] Zhihui Shao, Mohammad A. Islam, Shaolei Ren. Heat Behind the Meter: A Hidden Threat of Thermal Attacks in Edge Colocation Data Centers, in Proceedings of IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2021.

  • [AAAI'21] Jianyi Yang, Shaolei Ren. Robust Bandit Learning with Imperfect Context, in Proceedings of arXiv preprint arXiv:2102.05018 (2021).

  • 2020

  • [CCS'20] Lei Zhao, Yuncong Zhu, Jiang Ming, Yichen Zhang, Haotian Zhang, and Heng Yin. PatchScope: Memory Object Centric Patch Diffing, in the ACM Conference on Computer and Communications Security(CCS), November 2020.

  • [ASPLOS'20] Pan Zhang, Chengyu Song, Heng Yin, Deqing Zou, Elaine Shi and Hai Jin. KLOTSKI: Efficient Obfuscated Execution against Controlled-Channel Attacks, in International Conference on Architectural Support for Programming Languages and Operating Systems, March 2020.

  • [NDSS'20] Yue Duan, Xuezixiang Li, Jinghan Wang, and Heng Yin. DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing, in the Network and Distributed System Security Symposium, Feburary 2020.

  • [CCS'20] Keyu Man, Zhiyun Qian, Zhongjie Wang, Xiaofeng Zheng, Youjun Huang, Haixin Duan. DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2020.

  • [FSE'20] Yizhuo Zhai, Yu Hao, Hang Zhang, Daimeng Wang, Chengyu Song, Zhiyun Qian, Mohsen Lesani, Srikanth V. Krishnamurthy, Paul Yu. UBITect: A Precise and Scalable Method to Detect Use-Before-Initialization bugs in Linux Kernel, in Proceedings of the 2020 ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering(FSE), Sacramento, CA.

  • [USENIX Security'20] Xiaofeng Zheng, Chaoyi Lu, Jian Peng, Qiushi Yang, Dongjie Zhou, Baojun Liu, Keyu Man, Shuang Hao, Haixin Duan, Zhiyun Qian. Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices, in Proceedings of USENIX Security 2020, Boston MA.

  • [USENIX Security'20] Weiteng Chen, Xiaochen Zou, Guoren Li, Zhiyun Qian. KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities, in Proceedings of USENIX Security 2020, Boston MA.

  • [Sigmetrics'20] Pengxiong Zhu, Keyu Man, Zhongjie Wang, Zhiyun Qian, Roya Ensafi, J. Alex Halderman, Haixin Duan. Characterizing Transnational Internet Performance and the Great Bottleneck of China, in Proceedings of ACM SIGMETRICS 2020, Boston, MA.

  • [NDSS'20] Zhongjie Wang, Shitong Zhu, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth Krishnamurthy, Tracy D. Braun, Kevin S. Chan. SymTCP: Eluding Stateful Deep Packet Inspection with Automated Discrepancy Discover, in Proceedings of Eurosys 2020, Dresden, Germany.

  • [S&P'20] Umar Iqbal, Peter Snyder, Shitong Zhu, Benjamin Livshits, Zhiyun Qian, Zubair Shafiq. AdGraph: A Graph-Based Approach to Ad and Tracker Blocking, in Proceedings of IEEE Symposium on Security & Privacy (Oakland), 2020, San Francisco CA.

  • [FSE'20] Suhwan Song, Chengyu Song, Yeongjin Jang, and Byoungyoung Lee. CrFuzz: Fuzzing Multi-purpose Programs through Input Validation, in Proceedings of the 2020 ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Sacramento, CA, November 2020.

  • [ECCV'20] Shasha Li, Shitong Zhu, Sudipta Paul, Amit K. Roy-Chowdhury, Chengyu Song, Srikanth V. Krishnamurthy, Ananthram Swami, and Kevin S. Chan. Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency, in Proceedings of the 16th European Conference on Computer Vision (ECCV'20), August 2020.

  • [Oakland'20] Esmaeil M. Koruyeh, Shirin H. Shirazi, Khaled N. Khaswaneh, Chengyu Song, and Nael Abu-Ghazaleh. SPECCFI: CFI Informed Branch Prediction, in Proceedings of the 41st IEEE Symposium on Security and Privacy (Oakland'20), San Francisco, CA, May 2020.

  • [Micro'20] Hodjat Asghari Esfeden, Amirali Abdolrashidi, Shafiur Rahman, Daniel Wong, Nael Abu-Ghazaleh. BOW: Breathing Operand Windows to Exploit Bypassing in GPUs, in Proceedings of 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Athens, Greece.

  • [Micro'20] Shafiur Rahman, Nael Abu-Ghazaleh, Rajiv Gupta. GraphPulse: An Event-Driven Hardware Accelerator for Asynchronous Graph Processing, in Proceedings of 2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO), Athens, Greece.

  • [Micro'20] Liang Zhou, Laxmi Bhuyan, K. K. Ramakrishnan. Gemini: Learning to Manage CPU Power for Latency-Critical Search Engines, in Proceedings of Proc. 53rd IEEE/ACM International Symposium on Microarchitecture (MICRO 2020), Oct. 2020.

  • [ICFP'20] Jeremiah Griffin, Mohsen Lesani, Narges Shadab, Xizhe Yin. TLC: Temporal Logic of Distributed Components, in Proceedings of ACM SIGPLAN International Conference on Functional Programming.

  • [CAV'20] Xiao Li, Farzin Houshmand, Mohsen Lesani. Hampa: Solver-aided Recency-Aware Replication, in Proceedings of International Conference on Computer-Aided Verification.

  • [IGMETRICS'20] Zhihui Shao, Mohammad A. Islam, Shaolei Ren. Your Noise, My Signal: Exploiting Switching Noise for Stealthy Data Exfiltration from Desktop Computers, in Proceedings of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2020.

  • 2019

  • [USENIX Security'19] Yaowen Zheng, Ali Davanian, Heng Yin, Chengyu Song, Hongsong Zhu, and Limin Sun. Firm-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation, in Proceedings of the 28th USENIX Security Symposium, August 2019.

  • [NDSS'19] Lei Zhao, Yue Duan, Heng Yin, and Jifeng Xuan. Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing, in Proceedings of the Network and Distributed System Security Symposium, February 2019.

  • [CCS'19] Yue Cao, Zhongjie Wang, Zhiyun Qian, Chengyu Song, Srikanth Krishnamurthy, Paul Yu. Principled Unearthing of TCP Side Channel Vulnerabilities, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2019, London, UK.

  • [DAC'19] Daimeng Wang, Zhiyun Qian, Nael Abu-Ghazaleh, Srikanth V. Krishnamurthy. PAPP: Prefetcher-Aware Prime and Probe Side-channel Attack, in Proceedings of Design Automation Conference (DAC) 2019, Las Vegas, NV.

  • [WWW'19] Shitong Zhu, Umar Iqbal, Zhongjie Wang, Zhiyun Qian, Zubair Shafiq, Weiteng Chen. ShadowBlock: A Lightweight and Stealthy Adblocking Browser, in Proceedings of WWW 2019, San Francisco, CA.

  • [Sigmetrics'19] Lei Zhang, Zhemin Yang, Yuyu He, Mingqi Li, Sen Yang, Min Yang, Yuan Zhang, Zhiyun Qian. App in the Middle : Demystify Application Virtualization in Android and its Security Threats, in Proceedings of ACM SIGMETRICS 2019, Phoenix, AZ.

  • [NDSS'19] Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael Abu-Ghazaleh, Srikanth V. Krishnamurthy, Edward J. M. Colbert, Paul Yu. Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries, in Proceedings of the Network & Distributed System Security Symposium (NDSS) 2019, San Diego, CA

  • [ASE'19] Dongliang Mu, Wenbo Guo, Alejandro Cuevas, Yueqi Chen, Jinxuan Gai, Xinyu Xing, Bing Mao, Chengyu Song. RENN: Efficient Reverse Execution with Neural-Network-assisted Alias Analysis, in Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering (ASE'19), San Diego, CA, November 2019.

  • [DAC'19] Khaled N. Khasawneh, Esmaeil M. Koruyeh, Chengyu Song, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh. SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation, in Proceedings of the 2019 Design Automation Conference (DAC'19), Las Vegas, NV, June 2019.

  • [NDSS'19] Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy-Chowdhury, Ananthram Swami. Stealthy Adversarial Perturbations Against Real-Time Video Classification Systems, in Proceedings of the 2019 Network and Distributed System Security Symposium (NDSS'19), San Diego, CA, February 2019.

  • [NDSS'19] Daimeng Wang, Ajaya Neupane, Zhiyun Qian, Nael B Abu-Ghazaleh, Srikanth V Krishnamurthy, Edward JM Colbert, Paul Yu. Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Libraries, in Proceedings of the 2019 Network and Distributed System Security Symposium (NDSS'19).

  • [ASPLOS'19] Hodjat Asghari Esfeden, Farzad Khorasani, Hyeran Jeon, Daniel Wong, Nael Abu-Ghazaleh. CORF: Coalescing Operand Register File for GPUs, in Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems. 2019.

  • [ICCAD'19] Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael Abu-Ghazaleh. Rendered Insecure: GPU Side Channel Attacks are Practical, in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.

  • [FOCS'19] Vipul Goyal, Silas Richelson. Non-Malleable Commitments using Goldreich-Levin List Decoding, in Proceedings of the 2019 IEEE 60th Annual Symposium on Foundations of Computer Science(FOCS).

  • [SenSys'19] Kittipat Apicharttrisorn, Xukan Ran, Jiasi Chen, Srikanth V Krishnamurthy, Amit K Roy-Chowdhury. Frugal Following: Power Thrifty Object Detection and Tracking for Mobile Augmented Reality, in Proceedings of the 17th Conference on Embedded Networked Sensor Systems, 2019.

  • [OOPSLA'19] Zachary Benavides, Keval Vora, Rajiv Gupta. DProf: distributed profiler with strong guarantees, in Proceedings of the ACM on Programming Languages in October 2019.

  • [ICSE'19] Tanzirul Azim, Arash Alavi, Lulian Neamtiu, Rajiv Gupta. Dynamic slicing for Android, in Proceedings of the 41st International Conference on Software Engineering in May 2019.

  • [POPL'19] Farzin Houshmand, Mohsen Lesani. Hamsaz: Replication Coordination Analysis and Synthesis, in Proceedings of ACM Symposium on Principles of Programming Languages, 2019.

  • [ICCAD'19] Radhakrishna Sanka, Brian Crites, Jeffrey McDaniel, Philip Brisk, Douglas Densmore. Specification, Integration and Benchmarking of Continuous Flow Microfluidic Devices, in Proceedings of International Conference on Computer-Aided Design (ICCAD), Westminster, CO, USA, November 4-7, 2019.

  • [NDSS'19] Sina Faezi, Sujit Rokka Chhetri, Arnav Vaibhav Malawade, John Charles Chaput, William Grover, Philip Brisk, Mohammad Abdullah Al Faruque. Oligo-Snoop: a non-invasive side channel attack against DNA synthesis machines, in Proceedings of Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 24-27, 2019.

  • 2018

  • [CCS'18] Wei Song, Heng Yin, Chang Liu, and Dawn Song. DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis, in Proceedings of the 25th ACM Conference on Computer and Communications Security, October 2018.

  • [NDSS'18] Yue Duan, Mu Zhang, Abhishek Vasist Bhaskar, Heng Yin, Xiaorui Pan, Tongxin Li, Xueqiang Wang, and Xiaofeng Wang. Things You May Not Know About Android (Un)Packers: A Systematic Study based on Whole-System Emulation, in Proceedings of the Network and Distributed System Security Symposium, February 2018.

  • [NDSS'18] Shitong Zhu, Xunchao Hu, Zhiyun Qian, Zubair Shafiq, and Heng Yin. Measuring and Disrupting Anti-Adblockers Using Differential Execution Analysiss, in Proceedings of the Network and Distributed System Security Symposium, February 2018.

  • [CCS'18] Wei Song, Heng Yin, Chang Liu, and Dawn Song. DeepMem: Learning Graph Neural Network Models for Fast and Robust Memory Forensic Analysis, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2018, Toronto, Canada.

  • [CCS'18] Hoda Naghibijouybari, Ajaya Neupane, Zhiyun Qian, Nael Abu-Ghazaleh. Rendered Insecure: GPU Side Channel Attacks are Practical, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2018, Toronto, Canada.

  • [CCS'18] Geng Hong, Zhemin Yang, Sen Yang, Lei Zhang, Yuhong Nan, Zhibo Zhang, Min Yang, Yuan Zhang, Zhiyun Qian, Haixin Duan. How You Get Shot in the Back: A Systematical Study about Cryptojacking in the Real World, in Proceedings of the 25th ACM Conference on Computer and Communications Security, October 2018.

  • [CCS'18] Lei Zhang, Zhemin Yang, Yuyu He, Zhenyu Zhang, Zhiyun Qian, Geng Hong, Yuan Zhang, Min Yang. Invetter: Locating Insecure Input Validations in Android Services, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2018, Toronto, Canada.

  • [USENIX Security'18] Hang Zhang, Zhiyun Qian. Precise and Accurate Patch Presence Test for Binaries, in Proceedings of USENIX Security 2018, Baltimore, MD.

  • [USENIX Security'18] Weiteng Chen, Zhiyun Qian. Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets, in Proceedings of USENIX Security 2018, Baltimore, MD.

  • [USENIX Security'18] Seyed Mohammadjavad Seyed Talebi and Hamid Tavakoli, Hang Zhang, Zheng Zhang, Ardalan Amiri Sani, Zhiyun Qian. Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems, in Proceedings of USENIX Security 2018, Baltimore, MD.

  • [S&P'18] Ziqiao Zhou, Zhiyun Qian, Michael K. Reiter, Yinqian Zhang. Static Evaluation of Noninterference using Approximate Model Counting, in Proceedings of IEEE Security and Privacy (Oakland) 2018, San Francisco, CA.

  • [NDSS'18] Wookhyun Han, Byunggill Joe, Byoungyoung Lee, Chengyu Song, and Insik Shin. Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing, in Proceedings of the 2018 Network and Distributed System Security Symposium (NDSS'18), San Diego, CA, February 2018.

  • [Micro'18] Farzad Khorasani, Hodjat Asghari Esfeden, Nael Abu-Ghazaleh, Vivek Sarkar. In-Register Parameter Caching for Dynamic Neural Nets with Virtual Persistent Processor Specialization, in Proceedings of 2018 51st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).

  • [Asplos'18] Dmitry Evtyushkin, Ryan Riley, Nael CSE and ECE Abu-Ghazaleh, Dmitry Ponomarev. BranchScope: A New Side-Channel Attack on Directional Branch Predictor, In Proceedings of ACM SIGPLAN Notices 53.2 (2018): 693-707.

  • [SIGCOMM'18] Guyue Liu, Yuxin Ren, Mykola Yurchenko, K. K. Ramakrishnan, Timothy Wood Microboxes: high performance NFV with customizable, asynchronous TCP stacks and dynamic subscriptions, in Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication

  • [OOPSLA'18] Jason Ott, Chris Curtis, Tyson Loveless, Mohsen Lesani, Philip Brisk BioScript: Programming Safe Chemistry of Laboratories-on-a-Chip, in Proceedings of the ACM on Programming Languages 2.OOPSLA (2018): 1-31.

  • [ICCAD'18] Kenneth O’Neal, Mitch Liu, Hans Tang, Amin Kalantar, Kennen DeRenard, Philip Brisk HLSPredict: Cross Platform Performance Prediction for FPGA High-Level Synthesis, in Proceedings of International Conference on Computer-Aided Design (ICCAD), San Diego, CA, USA. November, 2018.

  • [ICCAD'18] Kenneth O’Neal, Mitch Liu, Hans Tang, Amin Kalantar, Kennen DeRenard, Philip Brisk HLSPredict: Cross Platform Performance Prediction for FPGA High-Level Synthesis, in Proceedings of International Conference on Computer-Aided Design (ICCAD), San Diego, CA, USA. November, 2018.

  • [CCS'18] Mohammad A. Islam, Shaolei Ren Ohm’s Law in Data Centers: A Voltage Side Channel for Timing Power Attacks, in Proceedings of ACM Conference on Computer and Communications Security (CCS), 2018.

  • [CCS'18] Mohammad A. Islam, Luting Yang, Kiran Ranganath, Shaolei Ren Why Some Like It Loud: Timing Power Attacks in Multi-tenant Data Centers Using an Acoustic Side Channel, in Proceedings of ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), 2018.

  • [HPCA'18] Weixiang Jiang, Shaolei Ren, Fangmin Liu, Hai Jin Non-IT Energy Accounting in Virtualized Datacenter, in Proceedings of IEEE International Symposium on High Performance Computer Architecture (HPCA), 2018.

  • 2017

  • [CCS'17] Xiaojun Xu, Chang Liu, Qian Feng, Heng Yin, Le Song and Dawn Song. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection, in the 24th ACM Conference on Computer and Communications Security, October 2017.

  • [CCS'17] David Korczynski and Heng Yin. Capturing Malware Propagations with Code Injections and Code-Reuse Attacks, in the 24th ACM Conference on Computer and Communications Security, October 2017.

  • [USENIX Security'17] Ren Ding, Chenxiong Qian, Chengyu Song, Bill Harris, Taesoo Kim, and Wenke Lee. Efficient Protection of Path-Sensitive Control Security,in Proceedings of the 26th USENIX Security Symposium, Vancouver, Canada, August 2017.

  • [RAID'17] Andrew Henderson, Heng Yin, Guang Jin, Hao Han, and Hongmei Deng. VDF: Targeted Evolutionary Fuzz Testing of Virtual Devices, in the 20th International Symposium on Research on Attacks, Intrusions and Defenses, September 2017.

  • [NDSS'17] Xiaorui Pan, Xueqiang Wang, Yue Duan, Xiaofeng Wang, and Heng Yin. Dark Hazard: Large-Scale Discovery of Unknown Hidden Sensitive Operations in Android Apps, appeared in the Network and Distributed System Security Symposium, February 2017.

  • [IMC'17] Zhongjie Wang, Yue Cao, Zhiyun Qian, Chengyu Song, Srikanth V. Krishnamurthy. Your State is Not Mine: A Closer Look at Evading Stateful Internet Censorship, in ACM Internet Measurement Conference (IMC) 2017, London, UK. (Source)

  • [SIGMETRICS'17] Alan Quach*, Zhongjie Wang*, and Zhiyun Qian. Both authors contributed equally. Investigation of the 2016 Linux TCP Stack Vulnerability at Scale, in Proceedings of ACM SIGMETRICS 2017, Urbana-Champaign, IL.

  • [Micro'17] Khasawneh, Khaled N., Nael Abu-Ghazaleh, Dmitry Ponomarev, and Lei Yu. RHMD: evasion-resilient hardware malware detectors, in Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, ACM, 2017.(slides)

  • [Micro'17] Naghibijouybari, Hoda, Khaled N. Khasawneh, and Nael Abu-Ghazaleh. Constructing and characterizing covert channels on GPGPUs In Proceedings of the 50th Annual IEEE/ACM International Symposium on Microarchitecture, ACM, 2017.(slides)

  • [ICCAD'17] Elwell, Jesse, Dmitry Evtyushkin, Dmitry Ponomarev, Nael Abu-Ghazaleh, and Ryan Riley. Hardening Extended Memory Access Control Schemes with Self-Verified Address Spaces

  • [DAC'17] Kayaalp, Mehmet, Khaled N. Khasawneh, Hodjat Asghari Esfeden, Jesse Elwell, Nael Abu-Ghazaleh, Dmitry Ponomarev, and Aamer Jaleel. RIC: relaxed inclusion caches for mitigating LLC side-channel attacks, in Design Automation Conference, 2017 54th ACM/EDAC/IEEE.(slides)

  • 2016

  • [CCS'16] Qian Feng, Rundong Zhou, Chengcheng Xu, Yao Cheng, Brian Testa, and Heng Yin. Scalable Graph-based Bug Search for Firmware Images, in the 23rd ACM Conference on Computer and Communications Security, October 2016.

  • [CCS'16] Hang Zhang, Dongdong She, Zhiyun Qian. Android ION Hazard: the Curse of Customizable Memory Management System, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2016, Vienna, Austria.(Website)

  • [CCS'16] Yuru Shao, Jason Ott, Yunhan Jack Jia, Zhiyun Qian, Z. Morley Mao, The Misuse of Android Unix Domain Socket and Security Implications, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2016, Vienna, Austria.

  • [USENIX SECURITY'16] Yue Cao, Zhiyun Qian, Zhongjie Wang, Tuan Dao, Srikanth V. Krishnamurthy, Lisa M. Marvel, Off-Path TCP Exploits: Global Rate Limit Considered Dangerous(CVE-2016-5696), in Proceedings of USENIX SECURITY 2016, Austin, TX.

  • [NDSS'16] Yuru Shao, Jason Ott, Qi Alfred Chen, Zhiyun Qian, Z. Morley Mao, Kratos: Discovering Inconsistent Security Policy Enforcement in the Android Framework, in Proceedings of the Network & Distributed System Security Symposium 2016, San Diego, CA.(Website)

  • [CCS'16] Kangjie Lu, Chengyu Song, Taesoo Kim, and Wenke Lee, UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages, in Proceedings of the 23rd ACM Conference on Computer and Communications Security, Vienna, Austria, October 2016.(Source)

  • [Micro'16] Evtyushkin, Dmitry, Dmitry Ponomarev, and Nael Abu-Ghazaleh. Jump over ASLR: Attacking branch predictors to bypass ASLR. In Microarchitecture, 2016 49th Annual IEEE/ACM International Symposium on. IEEE, 2016.

  • [DAC'16] Kayaalp, Mehmet, Nael Abu-Ghazaleh, Dmitry Ponomarev, and Aamer Jaleel, A high-resolution side-channel attack on last-level cache. In Proceedings of the 53rd Annual Design Automation Conference. ACM, 2016.(slides)

  • 2015

  • [CCS'15] Hang Zhang, Dongdong She, Zhiyun Qian, Android Root and its Providers: A Double-Edged Sword, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2015, Denver, CO.  Media coverage: [ARS Technica] [Trustlook] [Marketwired]

  • [CCS'15] Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Z. Morley Mao, Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks, in Proceedings of ACM Conference on Computer and Communications Security (CCS) 2015, Denver, CO.(Website)