One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation Y Xiao, X Zhang, Y Zhang, R Teodorescu 25th USENIX security symposium (USENIX Security 16), 19-35, 2016 | 293 | 2016 |
Detecting privileged side-channel attacks in shielded execution with Déjá Vu S Chen, X Zhang, MK Reiter, Y Zhang Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 257 | 2017 |
Homonit: Monitoring smart home apps from encrypted traffic W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 234 | 2018 |
{TXSPECTOR}: Uncovering attacks in ethereum from transactions M Zhang, X Zhang, Y Zhang, Z Lin 29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020 | 92 | 2020 |
Return-oriented flush-reload side channels on arm and their implications for android devices X Zhang, Y Xiao, Y Zhang Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 86 | 2016 |
Statistical privacy for streaming traffic X Zhang, J Hamm, MK Reiter, Y Zhang Proceedings of the 26th ISOC Symposium on network and distributed system …, 2019 | 49 | 2019 |
Os-level side channels without procfs: Exploring cross-app information leakage on ios X Zhang, X Wang, X Bai, Y Zhang, XF Wang Proceedings of the Symposium on Network and Distributed System Security, 2018 | 36 | 2018 |
You are where you have been: Sybil detection via geo-location analysis in OSNs X Zhang, H Zheng, X Li, S Du, H Zhu 2014 IEEE Global Communications Conference, 698-703, 2014 | 30 | 2014 |
Surfacefleet: Exploring distributed interactions unbounded from device, application, user, and time F Brudy, D Ledo, M Pahud, N Henry Riche, C Holz, A Waghmare, ... Proceedings of the 33rd Annual ACM Symposium on User Interface Software and …, 2020 | 23 | 2020 |
A measurement study of authentication rate-limiting mechanisms of modern websites B Lu, X Zhang, Z Ling, Y Zhang, Z Lin Proceedings of the 34th annual computer security applications conference, 89-100, 2018 | 23 | 2018 |
Understanding and detecting mobile ad fraud through the lens of invalid traffic S Sun, L Yu, X Zhang, M Xue, R Zhou, H Zhu, S Hao, X Lin Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 16 | 2021 |
Narrator: Secure and practical state continuity for trusted execution in the cloud J Niu, W Peng, X Zhang, Y Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 13 | 2022 |
Dissecting click fraud autonomy in the wild T Zhu, Y Meng, H Hu, X Zhang, M Xue, H Zhu Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 13 | 2021 |
Uncovering user interactions on smartphones via contactless wireless charging side channels T Ni, X Zhang, C Zuo, J Li, Z Yan, W Wang, W Xu, X Luo, Q Zhao 2023 IEEE Symposium on Security and Privacy (SP), 3399-3415, 2023 | 7 | 2023 |
An empirical study on ethereum private transactions and the security implications X Lyu, M Zhang, X Zhang, J Niu, Y Zhang, Z Lin arXiv preprint arXiv:2208.02858, 2022 | 6 | 2022 |
Defeating traffic analysis via differential privacy: a case study on streaming traffic X Zhang, J Hamm, MK Reiter, Y Zhang International Journal of Information Security 21 (3), 689-706, 2022 | 5 | 2022 |
{PRIDWEN}: Universally Hardening {SGX} Programs via {Load-Time} Synthesis F Sang, MW Shih, S Lee, X Zhang, M Steiner, M Vij, T Kim 2022 USENIX Annual Technical Conference (USENIX ATC 22), 455-472, 2022 | 4 | 2022 |
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning T Ni, J Li, X Zhang, C Zuo, W Wang, W Xu, X Luo, Q Zhao Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023 | 3 | 2023 |
Smartsec: Secret sharing-based location-aware privacy enhancement in smart devices BB Chirchir, X Zhang, M Li, Q Qian, N Ruan, H Zhu 2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015 | 3 | 2015 |
{POLICYCOMP}: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices L Zhou, C Wei, T Zhu, G Chen, X Zhang, S Du, H Cao, H Zhu 32nd USENIX Security Symposium (USENIX Security 23), 1073-1090, 2023 | 2 | 2023 |