X
Xiaokuan Zhang
Researcher at Ohio State University
Publications - 24
Citations - 769
Xiaokuan Zhang is an academic researcher from Ohio State University. The author has contributed to research in topics: Computer science & Cryptography. The author has an hindex of 9, co-authored 15 publications receiving 522 citations. Previous affiliations of Xiaokuan Zhang include Shanghai Jiao Tong University.
Papers
More filters
Proceedings ArticleDOI
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu
TL;DR: Deja Vu is presented, a software framework that enables a shielded execution to detect privileged side-channel attacks and builds into shielded execution the ability to check program execution time at the granularity of paths in its control-flow graph.
Proceedings Article
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
TL;DR: Novel techniques to determine the physical address mapping in DRAMmodules at runtime are developed at runtime (to improve the effectiveness of double-sided row hammer attacks), methods to exhaustively hammer a large fraction of physical memory from a guest VM (to collect exploitable vulnerable bits), and innovative approaches to break Xen paravirtualized memory isolation.
Proceedings ArticleDOI
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
TL;DR: The evaluation results suggest that HoMonit can effectively validate the working logic of SmartApps and achieve a high accuracy in the detection of SmartApp misbehaviors.
Proceedings ArticleDOI
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
TL;DR: A novel construction of flush-reload side channels on last-level caches of ARM processors, which, particularly, exploits return-oriented programming techniques to reload instructions is demonstrated.
Proceedings Article
{TXSPECTOR}: Uncovering Attacks in Ethereum from Transactions
TL;DR: It is demonstrated that TXSPECTOR can effectively detect attacks in the transactions and, as a byproduct, the corresponding vulnerabilities in the smart contracts, and how it can be used for forensic analysis on transactions.