What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yinqian Zhang
Google Scholar
74
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
CipherSteal: Stealing Input Data from TEE-Shielded Neural Networks with Ciphertext Side Channels.
Yuanyuan Yuan
Zhibo Liu
Sen Deng
Yanzuo Chen
Shuai Wang
Yinqian Zhang
Zhendong Su
2025
conf/ndss
WAVEN: WebAssembly Memory Virtualization for Enclaves.
Weili Wang
Honghan Ji
Peixuan He
Yao Zhang
Ye Wu
Yinqian Zhang
2025
conf/ndss
I Know What You Asked: Prompt Leakage via KV-Cache Sharing in Multi-Tenant LLM Serving.
Guanlong Wu
Zheng Zhang
Yao Zhang
Weili Wang
Jianyu Niu
Ye Wu
Yinqian Zhang
2025
conf/dsn
MicroSampler: A Framework for Microarchitecture-Level Leakage Detection in Constant Time Execution.
Moein Ghaniyoun
Kristin Barber
Yinqian Zhang
Radu Teodorescu
2025
conf/uss
EKC: A Portable and Extensible Kernel Compartment for De-Privileging Commodity OS.
Jiaqin Yan
Qiujiang Chen
Shuai Zhou
Yuke Peng
Guoxing Chen
Yinqian Zhang
2025
conf/uss
Automated Soundness and Completeness Vetting of Polygon zkEVM.
Xinghao Peng
Zhiyuan Sun
Kunsong Zhao
Zuchao Ma
Zihao Li
Jinan Jiang
Xiapu Luo
Yinqian Zhang
2025
conf/uss
Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption.
Wei Peng
Yinshuai Li
Yinqian Zhang
2024
conf/ccs
DoubleUp Roll: Double-spending in Arbitrum by Rolling It Back.
Zhiyuan Sun
Zihao Li
Xinghao Peng
Xiapu Luo
Muhui Jiang
Hao Zhou
Yinqian Zhang
2024
conf/ccs
HyperTheft: Thieving Model Weights from TEE-Shielded Neural Networks via Ciphertext Side Channels.
Yuanyuan Yuan
Zhibo Liu
Sen Deng
Yanzuo Chen
Shuai Wang
Yinqian Zhang
Zhendong Su
2024
conf/uss
pi-Jack: Physical-World Adversarial Attack on Monocular Depth Estimation with Perspective Hijacking.
Tianyue Zheng
Jingzhi Hu
Rui Tan
Yinqian Zhang
Ying He
Jun Luo
2024
conf/uss
HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64.
Peihua Zhang
Chenggang Wu
Xiangyu Meng
Yinqian Zhang
Mingfan Peng
Shiyang Zhang
Bing Hu
Mengyao Xie
Yuanming Lai
Yan Kang
Zhe Wang
2024
conf/esorics
SAEG: Stateful Automatic Exploit Generation.
Yifan Wu
Yinshuai Li
Hong Zhu
Yinqian Zhang
2024
conf/esorics
ReminISCence: Trusted Monitoring Against Privileged Preemption Side-Channel Attacks.
Weijie Chen
Yu Zhao
Yinqian Zhang
Weizhong Qiang
Deqing Zou
Hai Jin
2024
conf/asiaccs
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments.
Mengyuan Li
Yuheng Yang
Guoxing Chen
Mengjia Yan
Yinqian Zhang
2024
conf/acsac
Breaking the Privacy Barrier: On the Feasibility of Reorganization Attacks on Ethereum Private Transactions.
Mengya Zhang
Xingyu Lyu
Jianyu Niu
Xiaokuan Zhang
Yinqian Zhang
Zhiqiang Lin
2023
conf/ccs
PANIC: PAN-assisted Intra-process Memory Isolation on ARM.
Jiali Xu
Mengyao Xie
Chenggang Wu
Yinqian Zhang
Qijing Li
Xuan Huang
Yuanming Lai
Yan Kang
Wei Wang
Qiang Wei
Zhe Wang
2023
conf/uss
Controlled Data Races in Enclaves: Attacks and Detection.
Sanchuan Chen
Zhiqiang Lin
Yinqian Zhang
2023
conf/uss
Reusable Enclaves for Confidential Serverless Computing.
Shixuan Zhao
Pinshen Xu
Guoxing Chen
Mengya Zhang
Yinqian Zhang
Zhiqiang Lin
2023
conf/uss
Panda: Security Analysis of Algorand Smart Contracts.
Zhiyuan Sun
Xiapu Luo
Yinqian Zhang
2023
conf/uss
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations.
Sen Deng
Mengyuan Li
Yining Tang
Shuai Wang
Shoumeng Yan
Yinqian Zhang
2022
conf/ccs
CETIS: Retrofitting Intel CET for Generic and Efficient Intra-process Memory Isolation.
Mengyao Xie
Chenggang Wu
Yinqian Zhang
Jiali Xu
Yuanming Lai
Yan Kang
Wei Wang
Zhe Wang
2022
conf/ccs
ENGRAFT: Enclave-guarded Raft on Byzantine Faulty Nodes.
Weili Wang
Sen Deng
Jianyu Niu
Michael K. Reiter
Yinqian Zhang
2022
conf/ccs
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud.
Jianyu Niu
Wei Peng
Xiaokuan Zhang
Yinqian Zhang
2022
conf/uss
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties.
Guoxing Chen
Yinqian Zhang
2022
conf/sp
vSGX: Virtualizing SGX Enclaves on AMD SEV.
Shixuan Zhao
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
2022
conf/sp
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
Mengyuan Li
Luca Wilke
Jan Wichelmann
Thomas Eisenbarth
Radu Teodorescu
Yinqian Zhang
2022
conf/ndss
Multi-Certificate Attacks against Proof-of-Elapsed-Time and Their Countermeasures.
Huibo Wang
Guoxing Chen
Yinqian Zhang
Zhiqiang Lin
2021
conf/ccs
CrossLine: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV.
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
2021
conf/uss
Towards Formal Verification of State Continuity for Enclave Programs.
Mohit Kumar Jangid
Guoxing Chen
Yinqian Zhang
Zhiqiang Lin
2021
conf/uss
SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting.
Sanchuan Chen
Zhiqiang Lin
Yinqian Zhang
2021
conf/uss
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel.
Mengyuan Li
Yinqian Zhang
Huibo Wang
Kang Li
Yueqiang Cheng
2021
conf/asiaccs
See through Walls: Detecting Malware in SGX Enclaves with SGX-Bouncer.
Zeyu Zhang
Xiaoli Zhang
Qi Li
Kun Sun
Yinqian Zhang
Songsong Liu
Yukun Liu
Xiaoning Li
2021
conf/acsac
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization.
Mengyuan Li
Yinqian Zhang
Huibo Wang
Kang Li
Yueqiang Cheng
2020
conf/ccs
FirmXRay: Detecting Bluetooth Link Layer Vulnerabilities From Bare-Metal Firmware.
Haohuang Wen
Zhiqiang Lin
Yinqian Zhang
2020
conf/ccs
CCSW'20: 2020 Cloud Computing Security Workshop.
Radu Sion
Yinqian Zhang
2020
conf/uss
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions.
Mengya Zhang
Xiaokuan Zhang
Yinqian Zhang
Zhiqiang Lin
2020
conf/sp
SEIMI: Efficient and Secure SMAP-Enabled Intra-process Memory Isolation.
Zhe Wang
Chenggang Wu
Mengyao Xie
Yinqian Zhang
Kangjie Lu
Xiaofeng Zhang
Yuanming Lai
Yan Kang
Min Yang
2020
conf/ndss
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities.
Yuan Xiao
Yinqian Zhang
Radu Teodorescu
2019
conf/ccs
Speculative Execution Attacks and Cloud Security.
Yinqian Zhang
Radu Sion
2019
conf/ccs
OPERA: Open Remote Attestation for Intel's Secure Enclaves.
Guoxing Chen
Yinqian Zhang
Ten-Hwang Lai
2019
conf/ccs
Automatic Fingerprinting of Vulnerable BLE IoT Devices with Static UUIDs from Mobile Apps.
Chaoshun Zuo
Haohuang Wen
Zhiqiang Lin
Yinqian Zhang
2019
conf/ccs
Running Language Interpreters Inside SGX: A Lightweight, Legacy-Compatible Script Code Hardening Approach.
Huibo Wang
Erick Bauman
Vishal Karande
Zhiqiang Lin
Yueqiang Cheng
Yinqian Zhang
2019
conf/uss
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization.
Mengyuan Li
Yinqian Zhang
Zhiqiang Lin
Yan Solihin
2019
conf/uss
SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization.
Zhe Wang
Chenggang Wu
Yinqian Zhang
Bowen Tang
Pen-Chung Yew
Mengyao Xie
Yuanming Lai
Yan Kang
Yueqiang Cheng
Zhiping Shi
2019
conf/sp
Why Does Your Data Leak? Uncovering the Data Leakage in Cloud from Mobile Apps.
Chaoshun Zuo
Zhiqiang Lin
Yinqian Zhang
2019
conf/eurosp
SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution.
Guoxing Chen
Sanchuan Chen
Yuan Xiao
Yinqian Zhang
Zhiqiang Lin
Ten-Hwang Lai
2019
conf/ndss
OBFUSCURO: A Commodity Obfuscation Engine on Intel SGX.
Adil Ahmad
Byunggill Joe
Yuan Xiao
Yinqian Zhang
Insik Shin
Byoungyoung Lee
2019
conf/ndss
Statistical Privacy for Streaming Traffic.
Xiaokuan Zhang
Jihun Hamm
Michael K. Reiter
Yinqian Zhang
2019
conf/dsn
Your IoTs Are (Not) Mine: On the Remote Binding Between IoT Devices and Users.
Jiongyi Chen
Chaoshun Zuo
Wenrui Diao
Shuaike Dong
Qingchuan Zhao
Menghan Sun
Zhiqiang Lin
Yinqian Zhang
Kehuan Zhang
2018
conf/ccs
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic.
Wei Zhang
Yan Meng
Yugeng Liu
Xiaokuan Zhang
Yinqian Zhang
Haojin Zhu
2018
conf/ccs
Leveraging Hardware Transactional Memory for Cache Side-Channel Defenses.
Sanchuan Chen
Fangfei Liu
Zeyu Mi
Yinqian Zhang
Ruby B. Lee
Haibo Chen
XiaoFeng Wang
2018
conf/sp
Static Evaluation of Noninterference Using Approximate Model Counting.
Ziqiao Zhou
Zhiyun Qian
Michael K. Reiter
Yinqian Zhang
2018
conf/sp
Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races.
Guoxing Chen
Wenhao Wang
Tianyu Chen
Sanchuan Chen
Yinqian Zhang
XiaoFeng Wang
Ten-Hwang Lai
Dongdai Lin
2018
conf/ndss
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS.
Xiaokuan Zhang
Xueqiang Wang
Xiaolong Bai
Yinqian Zhang
XiaoFeng Wang
2018
conf/ndss
Face Flashing: a Secure Liveness Detection Protocol based on Light Reflections.
Di Tang
Zhe Zhou
Yinqian Zhang
Kehuan Zhang
2018
conf/acsac
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites.
Bo Lu
Xiaokuan Zhang
Ziman Ling
Yinqian Zhang
Zhiqiang Lin
2018
conf/acsac
Analyzing Cache Side Channels Using Deep Neural Networks.
Tianwei Zhang
Yinqian Zhang
Ruby B. Lee
2017
journals/popets
Personalized Pseudonyms for Servers in the Cloud.
Qiuyu Xiao
Michael K. Reiter
Yinqian Zhang
2017
conf/ccs
DoS Attacks on Your Memory in Cloud.
Tianwei Zhang
Yinqian Zhang
Ruby B. Lee
2017
conf/ccs
Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX.
Wenhao Wang
Guoxing Chen
Xiaorui Pan
Yinqian Zhang
XiaoFeng Wang
Vincent Bindschaedler
Haixu Tang
Carl A. Gunter
2017
conf/ccs
STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves.
Yuan Xiao
Mengyuan Li
Sanchuan Chen
Yinqian Zhang
2017
conf/ccs
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.
Sanchuan Chen
Xiaokuan Zhang
Michael K. Reiter
Yinqian Zhang
2017
conf/ccs
Cache Side Channels: State of the Art and Research Opportunities.
Yinqian Zhang
2016
conf/ccs
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices.
Xiaokuan Zhang
Yuan Xiao
Yinqian Zhang
2016
conf/ccs
A Software Approach to Defeating Side Channels in Last-Level Caches.
Ziqiao Zhou
Michael K. Reiter
Yinqian Zhang
2016
conf/uss
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation.
Yuan Xiao
Xiaokuan Zhang
Yinqian Zhang
Radu Teodorescu
2015
conf/ccs
Mitigating Storage Side Channels Using Statistical Privacy Mechanisms.
Qiuyu Xiao
Michael K. Reiter
Yinqian Zhang
2015
conf/uss
A Placement Vulnerability Study in Multi-Tenant Public Clouds.
Venkatanathan Varadarajan
Yinqian Zhang
Thomas Ristenpart
Michael M. Swift
2014
conf/ccs
Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2013
conf/ccs
Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.
Yinqian Zhang
Michael K. Reiter
2012
conf/ccs
Cross-VM side channels and their use to extract private keys.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2011
conf/sp
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Yinqian Zhang
Ari Juels
Alina Oprea
Michael K. Reiter
2010
conf/ccs
The security of modern password expiration: an algorithmic framework and empirical analysis.
Yinqian Zhang
Fabian Monrose
Michael K. Reiter
2008
conf/acsac
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences.
Yinqian Zhang
Xun Fan
Yijun Wang
Zhi Xue
Coauthors
Adil Ahmad
(1)
Alina Oprea
(1)
Ari Juels
(3)
Bing Hu
(1)
Bo Lu
(1)
Bowen Tang
(1)
Byoungyoung Lee
(1)
Byunggill Joe
(1)
Carl A. Gunter
(1)
Chaoshun Zuo
(3)
Chenggang Wu
(5)
Deqing Zou
(1)
Di Tang
(1)
Dongdai Lin
(1)
Erick Bauman
(1)
Fabian Monrose
(1)
Fangfei Liu
(1)
Guanlong Wu
(1)
Guoxing Chen
(10)
Hai Jin
(1)
Haibo Chen
(1)
Haixu Tang
(1)
Hao Zhou
(1)
Haohuang Wen
(2)
Haojin Zhu
(1)
Hong Zhu
(1)
Honghan Ji
(1)
Huibo Wang
(4)
Insik Shin
(1)
Jan Wichelmann
(1)
Jiali Xu
(2)
Jianyu Niu
(4)
Jiaqin Yan
(1)
Jihun Hamm
(1)
Jinan Jiang
(1)
Jingzhi Hu
(1)
Jiongyi Chen
(1)
Jun Luo
(1)
Kang Li
(2)
Kangjie Lu
(1)
Kehuan Zhang
(2)
Kristin Barber
(1)
Kun Sun
(1)
Kunsong Zhao
(1)
Luca Wilke
(1)
Menghan Sun
(1)
Mengjia Yan
(1)
Mengya Zhang
(3)
Mengyao Xie
(5)
Mengyuan Li
(9)
Michael K. Reiter
(12)
Michael M. Swift
(1)
Min Yang
(1)
Mingfan Peng
(1)
Moein Ghaniyoun
(1)
Mohit Kumar Jangid
(1)
Muhui Jiang
(1)
Peihua Zhang
(1)
Peixuan He
(1)
Pen-Chung Yew
(1)
Pinshen Xu
(1)
Qi Li
(1)
Qiang Wei
(1)
Qijing Li
(1)
Qingchuan Zhao
(1)
Qiujiang Chen
(1)
Qiuyu Xiao
(2)
Radu Sion
(2)
Radu Teodorescu
(4)
Ruby B. Lee
(3)
Rui Tan
(1)
Sanchuan Chen
(7)
Sen Deng
(4)
Shixuan Zhao
(2)
Shiyang Zhang
(1)
Shoumeng Yan
(1)
Shuai Wang
(3)
Shuai Zhou
(1)
Shuaike Dong
(1)
Songsong Liu
(1)
Ten-Hwang Lai
(3)
Thomas Eisenbarth
(1)
Thomas Ristenpart
(3)
Tianwei Zhang
(2)
Tianyu Chen
(1)
Tianyue Zheng
(1)
Venkatanathan Varadarajan
(1)
Vincent Bindschaedler
(1)
Vishal Karande
(1)
Wei Peng
(2)
Wei Wang
(2)
Wei Zhang
(1)
Weijie Chen
(1)
Weili Wang
(3)
Weizhong Qiang
(1)
Wenhao Wang
(2)
Wenrui Diao
(1)
Xiangyu Meng
(1)
XiaoFeng Wang
(4)
Xiaofeng Zhang
(1)
Xiaokuan Zhang
(10)
Xiaoli Zhang
(1)
Xiaolong Bai
(1)
Xiaoning Li
(1)
Xiaorui Pan
(1)
Xiapu Luo
(3)
Xinghao Peng
(2)
Xingyu Lyu
(1)
Xuan Huang
(1)
Xueqiang Wang
(1)
Xun Fan
(1)
Yan Kang
(5)
Yan Meng
(1)
Yan Solihin
(1)
Yanzuo Chen
(2)
Yao Zhang
(2)
Ye Wu
(2)
Yifan Wu
(1)
Yijun Wang
(1)
Ying He
(1)
Yining Tang
(1)
Yinqian Zhang
(74)
Yinshuai Li
(2)
Yu Zhao
(1)
Yuan Xiao
(6)
Yuanming Lai
(5)
Yuanyuan Yuan
(2)
Yueqiang Cheng
(4)
Yugeng Liu
(1)
Yuheng Yang
(1)
Yuke Peng
(1)
Yukun Liu
(1)
Zeyu Mi
(1)
Zeyu Zhang
(1)
Zhe Wang
(5)
Zhe Zhou
(1)
Zhendong Su
(2)
Zheng Zhang
(1)
Zhi Xue
(1)
Zhibo Liu
(2)
Zhiping Shi
(1)
Zhiqiang Lin
(17)
Zhiyuan Sun
(3)
Zhiyun Qian
(1)
Zihao Li
(2)
Ziman Ling
(1)
Ziqiao Zhou
(2)
Zuchao Ma
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to