What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zhenkai Zhang
Google Scholar
ORCID:
0000-0002-9025-3460
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/host
FanBleed: Stealing Your Secrets via Observing Your Cooling Fan.
Sisheng Liang
Zhengxiong Li
Zihao Zhan
Zhenkai Zhang
2024
conf/ccs
Toward Understanding the Security of Plugins in Continuous Integration Services.
Xiaofan Li
Yacong Gu
Chu Qiao
Zhenkai Zhang
Daiping Liu
Lingyun Ying
Haixin Duan
Xing Gao
2024
conf/uss
GPU Memory Exploitation for Fun and Profit.
Yanan Guo
Zhenkai Zhang
Jun Yang
2024
conf/uss
Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive.
Zhenkai Zhang
Kunbei Cai
Yanan Guo
Fan Yao
Xing Gao
2024
conf/sp
DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories.
Kunbei Cai
Md Hafizul Islam Chowdhuryy
Zhenkai Zhang
Fan Yao
2024
conf/asiaccs
PowSpectre: Powering Up Speculation Attacks with TSX-based Replay.
Md Hafizul Islam Chowdhuryy
Zhenkai Zhang
Fan Yao
2023
conf/ccs
TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG.
Zhenkai Zhang
Tyler N. Allen
Fan Yao
Xing Gao
Rong Ge
2022
conf/sp
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Sisheng Liang
Zihao Zhan
Fan Yao
Long Cheng
Zhenkai Zhang
2022
conf/sp
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Zihao Zhan
Zhenkai Zhang
Sisheng Liang
Fan Yao
Xenofon D. Koutsoukos
2022
conf/eurosp
LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit.
Mert Side
Fan Yao
Zhenkai Zhang
2022
conf/host
On the Feasibility of Training-time Trojan Attacks through Hardware-based Faults in Memory.
Kunbei Cai
Zhenkai Zhang
Fan Yao
2021
conf/asiaccs
Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels.
Zhenkai Zhang
Sisheng Liang
Fan Yao
Xing Gao
2020
conf/sp
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
Zhenkai Zhang
Zihao Zhan
Daniel Balasubramanian
Bo Li
Péter Völgyesi
Xenofon D. Koutsoukos
2020
conf/host
BitJabber: The World's Fastest Electromagnetic Covert Channel.
Zihao Zhan
Zhenkai Zhang
Xenofon D. Koutsoukos
2018
conf/ccs
Triggering Rowhammer Hardware Faults on ARM: A Revisit.
Zhenkai Zhang
Zihao Zhan
Daniel Balasubramanian
Xenofon D. Koutsoukos
Gabor Karsai
Coauthors
Bo Li
(1)
Chu Qiao
(1)
Daiping Liu
(1)
Daniel Balasubramanian
(2)
Fan Yao
(9)
Gabor Karsai
(1)
Haixin Duan
(1)
Jun Yang
(1)
Kunbei Cai
(3)
Lingyun Ying
(1)
Long Cheng
(1)
Md Hafizul Islam Chowdhuryy
(2)
Mert Side
(1)
Péter Völgyesi
(1)
Rong Ge
(1)
Sisheng Liang
(4)
Tyler N. Allen
(1)
Xenofon D. Koutsoukos
(4)
Xiaofan Li
(1)
Xing Gao
(4)
Yacong Gu
(1)
Yanan Guo
(1)
Yanan Guo
(1)
Zhengxiong Li
(1)
Zhenkai Zhang
(15)
Zihao Zhan
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to