Biblio

Export 15 results:
Filters: Author is Yinqian Zhang  [Clear All Filters]
2023
Deng S, Li M, Tang Y, Wang S, Yan S, Zhang Y.  2023.  CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations. 32nd USENIX Security Symposium (USENIX Security 23). :6843--6860.
Chen S, Lin Z, Zhang Y.  2023.  Controlled Data Races in Enclaves: Attacks and Detection. 32nd USENIX Security Symposium (USENIX Security 23). :4069--4086.
Sun Z, Luo X, Zhang Y.  2023.  Panda: Security Analysis of Algorand Smart Contracts. 32nd USENIX Security Symposium (USENIX Security 23). :1811--1828.
Zhao S, Xu P, Chen G, Zhang M, Zhang Y, Lin Z.  2023.  Reusable Enclaves for Confidential Serverless Computing. 32nd USENIX Security Symposium (USENIX Security 23). :4015--4032.
2022
Chen G, Zhang Y.  2022.  MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties. 31st USENIX Security Symposium (USENIX Security 22). :4095--4110.
2021
Li M, Zhang Y, Wang H, Li K, Cheng Y.  2021.  CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel. 30th USENIX Security Symposium (USENIX Security 21). :717--732.
Chen S, Lin Z, Zhang Y.  2021.  SelectiveTaint: Efficient Data Flow Tracking With Static Binary Rewriting. 30th USENIX Security Symposium (USENIX Security 21). :1665--1682.
Jangid MKumar, Chen G, Zhang Y, Lin Z.  2021.  Towards Formal Verification of State Continuity for Enclave Programs. 30th USENIX Security Symposium (USENIX Security 21). :573--590.
2020
Zhang M, Zhang X, Zhang Y, Lin Z.  2020.  TXSPECTOR: Uncovering Attacks in Ethereum from Transactions. 29th USENIX Security Symposium (USENIX Security 20). :2775--2792.
2019
Li M, Zhang Y, Lin Z, Solihin Y.  2019.  Exploiting Unprotected I/O Operations in AMD’s Secure Encrypted Virtualization. 28th USENIX Security Symposium (USENIX Security 19). :1257--1272.
Wang Z, Wu C, Zhang Y, Tang B, Yew P-C, Xie M, Lai Y, Kang Y, Cheng Y, Shi Z.  2019.  SafeHidden: An Efficient and Secure Information Hiding Technique Using Re-randomization. 28th USENIX Security Symposium (USENIX Security 19). :1239--1256.
Wang W, Zhang Y, Lin Z.  2019.  Time and Order: Towards Automatically Identifying Side-Channel Vulnerabilities in Enclave Binaries. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :443--457.
2018
Wang L, Li M, Zhang Y, Ristenpart T, Swift M.  2018.  Peeking Behind the Curtains of Serverless Platforms. 2018 USENIX Annual Technical Conference (USENIX ATC 18). :133--146.
2015
Varadarajan V, Zhang Y, Ristenpart T, Swift M.  2015.  A Placement Vulnerability Study in Multi-Tenant Public Clouds. 24th USENIX Security Symposium (USENIX Security 15). :913--928.