scispace - formally typeset
X

Xiaokuan Zhang

Researcher at Ohio State University

Publications -  24
Citations -  769

Xiaokuan Zhang is an academic researcher from Ohio State University. The author has contributed to research in topics: Computer science & Cryptography. The author has an hindex of 9, co-authored 15 publications receiving 522 citations. Previous affiliations of Xiaokuan Zhang include Shanghai Jiao Tong University.

Papers
More filters
Proceedings ArticleDOI

Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu

TL;DR: Deja Vu is presented, a software framework that enables a shielded execution to detect privileged side-channel attacks and builds into shielded execution the ability to check program execution time at the granularity of paths in its control-flow graph.
Proceedings Article

One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation

TL;DR: Novel techniques to determine the physical address mapping in DRAMmodules at runtime are developed at runtime (to improve the effectiveness of double-sided row hammer attacks), methods to exhaustively hammer a large fraction of physical memory from a guest VM (to collect exploitable vulnerable bits), and innovative approaches to break Xen paravirtualized memory isolation.
Proceedings ArticleDOI

HoMonit: Monitoring Smart Home Apps from Encrypted Traffic

TL;DR: The evaluation results suggest that HoMonit can effectively validate the working logic of SmartApps and achieve a high accuracy in the detection of SmartApp misbehaviors.
Proceedings ArticleDOI

Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices

TL;DR: A novel construction of flush-reload side channels on last-level caches of ARM processors, which, particularly, exploits return-oriented programming techniques to reload instructions is demonstrated.
Proceedings Article

{TXSPECTOR}: Uncovering Attacks in Ethereum from Transactions

TL;DR: It is demonstrated that TXSPECTOR can effectively detect attacks in the transactions and, as a byproduct, the corresponding vulnerabilities in the smart contracts, and how it can be used for forensic analysis on transactions.