Follow
Yinqian Zhang
Yinqian Zhang
Professor, Southern University of Science and Technology
Verified email at acm.org - Homepage
Title
Cited by
Cited by
Year
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of CCS, 2012
10682012
Peeking behind the curtains of serverless platforms
L Wang, M Li, Y Zhang, T Ristenpart, M Swift
2018 USENIX annual technical conference (USENIX ATC 18), 133-146, 2018
7372018
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
5072014
Homealone: Co-residency detection in the cloud via side-channel analysis
Y Zhang, A Juels, A Oprea, MK Reiter
2011 IEEE symposium on security and privacy, 313-328, 2011
4902011
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019
4812019
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX
W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
4752017
One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation
Y Xiao, X Zhang, Y Zhang, R Teodorescu
25th USENIX security symposium (USENIX Security 16), 19-35, 2016
3202016
Cloudradar: A real-time side-channel attack detection system in clouds
T Zhang, Y Zhang, RB Lee
Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016
3122016
Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud
Y Zhang, MK Reiter
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
3072013
The security of modern password expiration: An algorithmic framework and empirical analysis
Y Zhang, F Monrose, MK Reiter
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2792010
Detecting privileged side-channel attacks in shielded execution with Déjá Vu
S Chen, X Zhang, MK Reiter, Y Zhang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
2762017
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2592018
A placement vulnerability study in {Multi-Tenant} public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015
2292015
A software approach to defeating side channels in last-level caches
Z Zhou, MK Reiter, Y Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2002016
Sgxpectre attacks: Leaking enclave secrets via speculative execution
G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai
arXiv preprint arXiv:1802.09085, 2018
1472018
Why does your data leak? uncovering the data leakage in cloud from mobile apps
C Zuo, Z Lin, Y Zhang
2019 IEEE Symposium on Security and Privacy (SP), 1296-1310, 2019
1372019
{TXSPECTOR}: Uncovering attacks in ethereum from transactions
M Zhang, X Zhang, Y Zhang, Z Lin
29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020
1212020
Exploiting unprotected {I/O} operations in {AMD’s} secure encrypted virtualization
M Li, Y Zhang, Z Lin, Y Solihin
28th USENIX Security Symposium (USENIX Security 19), 1257-1272, 2019
1062019
A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography
X Lou, T Zhang, J Jiang, Y Zhang
ACM Computing Surveys (CSUR) 54 (6), 1-37, 2021
1032021
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races
G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin
2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018
1032018
The system can't perform the operation now. Try again later.
Articles 1–20