Zhen Ling

Google Scholar
19 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
TORCHLIGHT: Shedding LIGHT on Real-World Attacks on Cloudless IoT Devices Concealed within the Tor Network.
2025
conf/uss
The Cost of Performance: Breaking ThreadX with Kernel Object Masquerading Attacks.
2025
conf/uss
Distributed Private Aggregation in Graph Neural Networks.
2024
conf/uss
A Friend's Eye is A Good Mirror: Synthesizing MCU Peripheral Models from Peripheral Drivers.
2024
conf/uss
Relation Mining Under Local Differential Privacy.
2024
conf/ndss
LDR: Secure and Efficient Linux Driver Runtime for Embedded TEE Systems.
2023
conf/ndss
Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks.
2013
conf/ndss
How Privacy Leaks From Bluetooth Mouse?
Filters
Years:  to