Publications
Authors with "_" is student/scholar in my lab or courses; ˆ indicates equal contribution; * indicates the corresponding author.Peer-Reviewed Conference and Workshop Publications
-
SCRUTINIZER: Towards Secure Forensics on Compromised TrustZone
Yiming Zhang, Fengwei Zhang* , Xiapu Luo*, Rui Hou, Xuhua Ding, Zhenkai Liang, Shoumeng Yan*, Tao Wei, and Zhengyu He
To Appear In Proceedings of theNetwork and Distributed System Security Symposium ( , San Diego, CA, February 2025.NDSS'25 )
-
HyperTEE: A Decoupled TEE Architecture with Secure Enclave Management
Yunkai Bai, Peinna Li, Yubiao Huang, Michael C. Huang, Shijun Zhao, Lutan Zhao, Fengwei Zhang , Dan Meng, and Rui Hou
To Appear In Proceedings of the57th IEEE/ACM International Symposium on Microarchitecture ( , Austin, TX, November 2024.MICRO'24 )
-
The HitchHiker’s Guide to High-Assurance System Observability Protection with Efficient Permission Switches
Chuqi Zhang, Jun Zeng,Yiming Zhang, Adil Ahmad, Fengwei Zhang , Zhankai Liang, and Hai Jin
To Appear In Proceedings of the31th ACM Conference on Computer and Communications Security ( , Salt Lake City, UT, October 2024.CCS'24 )
-
Efficiently Rebuilding Coverage in Hardware-Assisted Greybox Fuzzing
Tai Yue, Yibo Jin, Fengwei Zhang* ,Zhenyu Ning, Pengfei Wang*, Xu Zhou, and Kai Lu
To Appear In Proceedings of the27th International Symposium on Research in Attacks, Intrusions and Defenses ( , Palazzo della Salute in Padua, Italy, September 2024.RAID'24 )
-
MOAT: Towards Safe BPF Kernel Extension [slides]
Hongyi Lu, Shuai Wang*, Yechang Wu, Wanning He, and Fengwei Zhang*
To Appear In Proceedings of theUSENIX Security Symposium ( , Philadelphia, PA, August 2024.USENIX Security'24 )
-
BootRIST: Detecting and Isolating Mercurial Cores at the Booting Stage [slides]
Yihao Luo, Yunjie Deng, Jingquan Ge, Zhenyu Ning, and Fengwei Zhang*
To Appear In Proceedings of the29th European Symposium on Research in Computer Security ( , Bydgoszcz, Poland, September 2024.ESORICS'24 )
-
FortifyPatch: Towards Tamper-resistant Live Patching in Linux-based Hypervisor
Zhenyu Ye,Lei Zhou, Fengwei Zhang , Wenqiang Jin,Zhenyu Ning*, Yupeng Hu, and Zheng Qin
To Appear In Proceedings of theACM SIGSOFT International Symposium on Software Testing and Analysis, ( , Vienna, Austria, September 2024.ISSTA'24 )
-
ESem: To Harden Process Synchronization for Servers [slides]
Zhanbo Wang, Jiaxin Zhan, Xuhua Ding, Fengwei Zhang* , and Ning Hu
In Proceedings of the19th ACM ASIA Conference on Computer and Communications Security ( , Singapore, July 2024.AsiaCCS'24 )
-
DTD: Comprehensive and Scalable Testing for Debuggers [slides]
Hongyi Lu, Zhibo Liu*, Shuai Wang, and Fengwei Zhang*
In Proceedings of theACM International Conference on the Foundations of Software Engineering ( , Porto de Galinhas, Brazil, July 2024.FSE'24 )
-
BFTRAND: Low-latency Random Number Provider for BFT Smart Contracts [slides]
Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang* , Zhenyu Ning, Man Ho Allen Au, and Weisong Shi
In Proceedings of the54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ( , Brisbane, Australia, June 2024.DSN'24 )
-
Tatoo: A Flexible Hardware Platform for Binary-Only Fuzzing [slides]
Jinting Wuˆ, Haodong Zhengˆ, Yu Wang, Tai Yue, and Fengwei Zhang*
In Proceedings of the61st IEEE/ACM Design Automation Conference ( , San Francisco, CA, June 2024.DAC'24 )
-
SoK: A Comparison Study of Arm TrustZone and CCA [slides]
Haoyang Huang, Fengwei Zhang* , Shoumeng Yan, Tao Wei, and Zhengyu He
In Proceedings of theInternational Symposium on Secure and Private Execution Environment Design ( , Orlando, Florida, May 2024.SEED'24 )
-
CAGE: Complementing Arm CCA with GPU Extensions [slides]
Chenxu Wang, Fengwei Zhang* , Yunjie Deng, Kevin Leach, Jiannong Cao,Zhenyu Ning, Shoumeng Yan, and Zhengyu He
In Proceedings of theNetwork and Distributed System Security Symposium ( , San Diego, CA, February 2024.NDSS'24 )
CAGE project is online! [Web] -
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery
Boyang Ma, Yilin Yang, Jinku Li,Fengwei Zhang , Wenbo Shen, Yajin Zhou, Jianfeng Ma
In Proceedings of the30th ACM Conference on Computer and Communications Security ( , Copenhagen, Denmark, November 2023.CCS'23 )
-
Raft: Hardware-assisted Dynamic Information Flow Tracking for Runtime Protection on RISC-V [slides]
Yu Wang, Jinting Wu, Haodong Zheng, Zhenyu Ning ,Boyuan He ,Fengwei Zhang*
In Proceedings of the26th International Symposium on Research in Attacks, Intrusions and Defenses ( , Hong Kong, October, 2023.RAID'23 )
-
RingGuard: Guard io_uring with eBPF [slides]
Wanning Heˆ, Hongyi Luˆ, Fengwei Zhang* , and Shuai Wang*
In Proceedings of the1st Workshop on eBPF and Kernel Extensions ( , in conjunction with theeBPF'23 )ACM SIGCOMM'23 , New York City, NY, September 2023. -
Shelter: Extending Arm CCA with Isolation in User Space [slides]
Yiming Zhangˆ, Yuxin Huˆ, Zhenyu Ning, Fengwei Zhang* , Xiapu Luo,Haoyang Huang, Shoumeng Yan, and Zhengyu He
In Proceedings of the32nd USENIX Security Symposium ( , Anaheim, CA, August 2023.USENIX Security'23 )
Shelter project is online! [Web] -
Alligator In Vest: A Practical Failure-Diagnosis Framework via Arm Hardware Features [slides]
Yiming Zhang, Yuxin Hu, Haonan Li, Wenxuan Shi, Zhenyu Ning*, Xiapu Luo*, and Fengwei Zhang
In Proceedings of the32nd ACM SIGSOFT International Symposium on Software Testing and Analysis ( , Seattle, Washington, July 2023.ISSTA'23 )
-
FlushTime: Towards Mitigating Flush-based Cache Attacks via Collaberating Flush Instructions & Timers on ARMv8-A [slides]
Jingquan Ge and Fengwei Zhang*
In Proceedings of the18th ACM ASIA Conference on Computer and Communications Security ( , Melbourne, Australia, July 2023.AsiaCCS'23 )
-
StrongBox: A GPU TEE on Arm Endpoints [slides]
Yunjie Dengˆ, Chenxu Wangˆ, Shunchang Yu, Shiqing Liu, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, and Fengwei Zhang*
In Proceedings of the29th ACM Conference on Computer and Communications Security ( , Los Angeles, CA, November 2022.CCS'22 )
StrongBox project is online! [Web] -
Raven: A Novel Kernel Debugging Tool on RISC-V [slides]
Hongyi Lu, Fengwei Zhang*
In Proceedings of the59th IEEE/ACM Design Automation Conference ( , San Francisco, CA, July 2022.DAC'22 )
-
SMILE: Secure Memory Introspection for Live Enclave [slides]
Lei Zhou, Xuhua Ding, Fengwei Zhang*
In Proceedings of the43rd IEEE Symposium on Security and Privacy ( , San Francisco, CA, May 2022.S&P'22 )
-
SOTER: Guarding Black-box Inference for General Neural Networks at the Edge
Tianxiang Shen, Ji Qi, Jianyu Jiang, Xian Wang, Siyuan Wen, Xusheng Chen, Shixiong Zhao, Sen Wang, Li Chen, Xiapu Luo, Fengwei Zhang , and Heming Cui
In Proceedings of the2022 USENIX Annual Technical Conference ( , San Francisco, CA, July 2022.ATC'22 )
-
Speedster: An Efficient Multi-party State Channel via Enclaves [slides]
Jinghui Liao, Fengwei Zhang* , Wenhai Sun, and Weisong Shi
In Proceedings of the17th ACM ASIA Conference on Computer and Communications Security ( , Nagasaki, Japan, May 2022.AsiaCCS'22 )
-
RetTag: Hardware-assisted Return Address Integrity on RISC-V [slides]
Yu Wang, Jinting Wu, Tai Yue, Zhenyu Ning*, and Fengwei Zhang
In Proceedings of the15th European Workshop on Systems Security ( , in conjunction with theEuroSec'22 )European Conference on Computer Systems ( , Rennes, France, April 2022.EuroSys'22 ) -
Efficient and DoS-resistant Consensus for Permissioned Blockchains [slides]
Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, Hubert Chan, Fengwei Zhang , Xiapu Luo, Sen Wang, Gong Zhang, and Heming Cui
In Proceedings of the39th International Symposium on Computer Performance, Modeling, Measurements and Evaluation ( , Politecnico Di Milano, Italy, November 2021.Performance'21 )
-
A Novel Memory Management for RISC-V Enclaves [slides]
Haonan Liˆ, Weijie Huangˆ, Mingde Ren, Hongyi Lu, Zhenyu Ning*, Heming Cui, and Fengwei Zhang
In Proceedings of theHardware and Architectural Support for Security and Privacy ( , in conjunction with theHASP'21 )54th IEEE/ACM International Symposium on Microarchitecture ( , October 2021.MICRO'21 ) -
Position Paper: Lessons Learned from Blockchain Applications of Trusted Execution Environments and Implications for Future Research
Rabimba Karanjai, Weidong Shi, Lei Xu, Lin Chen, Fengwei Zhang , and Zhimin Gao
In Proceedings of theHardware and Architectural Support for Security and Privacy ( , in conjunction with theHASP'21 )54th IEEE/ACM International Symposium on Microarchitecture ( , October 2021.MICRO'21 ) -
BadUSB-C: Revisiting BadUSB with Type-C [slides]
Hongyi Lu, Yechang Wu, Shuqing Li, You Lin, Chaozu Zhang, and Fengwei Zhang*
In Proceedings of the15th Workshop On Offensive Technologies ( , in conjunction with theWOOT'21 )42nd IEEE Symposium on Security and Privacy ( , May, 2021.S&P'21 )
This work is a course project from my CS 315 Computer Security Class, all co-authors are undergraduates in the class.
CVE-2021-22325. -
Happer: Unpacking Android Apps via a Hardware-Assisted Approach
Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang , and Man Ho Au
In42nd IEEE Symposium on Security and Privacy ( , May, 2021.S&P'21 ) -
E-SGX: Cache Side-Channel Protection for Intel SGX on Untrusted OS
Fan Lang, Huorong Li, Wei Wang, Jingqiang Lin, Fengwei Zhang , Wuqiong Pan, and Qiongxiao Wang
In Proceedings of the16th International Conference on Information Security and Cryptology ( , Guangzhou, China, December 2020.Inscrypt'20 )
-
SEED: Confidential Big Data Workflow Scheduling with Intel SGX Under Deadline Constraints [slides] [video]
Ishtiaq Ahmed, Saeid Mofrad, Shiyong Lu, Changxin Bai, Fengwei Zhang* , and Dunren Che
In Proceedings of theIEEE International Conference on Services Computing ( , Beijing, China, October 2020.SCC'20 )
-
HART: Hardware-assisted Kernel Module Tracing on Arm [slides] [1-minute video] [15-minutes video]
Yunlan Duˆ, Zhenyu Ningˆ, Jun Xu, Zilong Wang, Yueh-Hsun Lin, Fengwei Zhang* , Xinyu Xing, and Bing Mao
In Proceedings of the25th European Symposium on Research in Computer Security ( , Guildford, United Kingdom, September 2020.ESORICS'20 )
-
Uranus: Simple, Efficient SGX Programming and Its Applications
Jianyu Jiang, Xusheng Chen, Tze On Li, Cheng Wang, Tianxiang Shen, Shixiong Zhao, Heming Cui, Cho-Li Wang, Fengwei Zhang
In Proceedings of the15th ACM ASIA Conference on Computer and Communications Security ( , Taipei, Taiwan, October 2020.AsiaCCS'20 )
-
KShot: Live Kernel Patching with SMM and SGX [slides] [1-minute video] [video in Chinese]
Lei Zhou, Fengwei Zhang* , Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, and Guojun Wang
In Proceedings of the50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks ( , Valencia, Spain, June 2020 (Runner-up Best Paper Award, 3 out of 291 submissions).DSN'20 )
-
SecDATAVIEW: A Secure Big Data Workflow Management System for Heterogeneous Computing Environments [slides]
[Artifacts Evaluated – Functional]
[Source Code]
Saeid Mofrad, Ishtiaq Ahmed, Shiyong Lu, Ping Yang, Heming Cui, and Fengwei Zhang*
In Proceedings of the35th Annual Computer Security Applications Conference ( , San Juan, Puerto Rico, December 2019.ACSAC'19 )
-
Defeating Speculative-Execution Attacks on SGX with HyperRace
Guoxing Chen, Mengyuan Li, Fengwei Zhang , and Yinqian Zhang
In Proceedings of the2019 IEEE Conference on Dependable and Secure Computing ( , Hangzhou, China, November 2019.IDSC'19 )
-
SecLabel: Enhancing RISC-V Platform Security with Labelled Architecture [slides]
Zhenyu Ning Yinqian Zhang, and Fengwei Zhang*
In the1st China RISC-V Forum ( , Shenzhen, China, November 2019.CRVF'19 )
-
A Study of the Multiple Sign-in Feature in Web Applications
Marwan Albahar, Xing Gao, Gaby G. Dagher, Daiping Liu, Fengwei Zhang , and Jidong Xiao
In Proceedings of the15th EAI International Conference on Security and Privacy in Communication Networks ( , Short paper, Orlando, Florida, October 2019.SecureComm'19 )
-
Nighthawk: Transparent System Introspection from Ring -3 [slides]
Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang* , and Guojun Wang
In Proceedings of the24th European Symposium on Research in Computer Security ( , Luxembourg, September 2019.ESORICS'19 )
-
Understanding the Security of Traffic Signal Infrastructure [slides]
Zhenyu Ning, Fengwei Zhang* , and Stephen Remias
In Proceedings of the16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment ( , Gothenburg, Sweden, June 2019.DIMVA'19 )
-
Understanding the Security of ARM Debugging Features [slides]
Zhenyu Ning and Fengwei Zhang
In Proceedings of the40th IEEE Symposium on Security & Privacy ( , San Francisco, California, May, 2019.S&P'19 )
Nailgun project is online! [Web] [PoC] [Video1] [Video2] CVE-2018-18068. -
Preliminary Study of Trusted Execution Environments on Heterogeneous Edge Platforms [bib]
Zhenyu Ning, Jinghui Liao, Fengwei Zhang , and Weisong Shi
In Proceedings of the1st ACM/IEEE Workshop on Security and Privacy in Edge Computing ( , in conjunction with TheEdgeSP'18 )3rd ACM/IEEE Symposium on Edge Computing ( , Bellevue, WA, October 2018.SEC'18 ) -
A Comparison Study of Intel SGX and AMD Memory Encryption Technology [bib]
Saeid Mofrad, Fengwei Zhang , Shiyong Lu, and Weidong Shi
In Proceedings of theHardware and Architectural Support for Security and Privacy ( , in conjunction with TheHASP'18 )45th International Symposium on Computer Architecture ( , Los Angeles, California, June 2018.ISCA'18 ) -
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis [bib]
Zhenyu Ning and Fengwei Zhang
In Proceedings of the48th IEEE/IFIP International Conference on Dependable Systems and Networks ( , Luxembourg, June 2018.DSN'18 ) -
MobiCeal: Towards Secure and Practical Plausibly Deniable Encryption on Mobile Devices [bib]
Bing Chang, Fengwei Zhang , Bo Chen, Yingjiu Li, Wen-Tao Zhu, Yangguang Tian, Zhan Wang, and Albert Ching
In Proceedings of the48th IEEE/IFIP International Conference on Dependable Systems and Networks ( , Luxembourg, June 2018.DSN'18 ) -
Transparent Malware Debugging on x86 and ARM [bib]
Zhenyu Ning and Fengwei Zhang
In DEF CON China Hacking Conference, Beijing, China, May 2018. -
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices [bib]
Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang , Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, and Luning Xia
In Proceedings of the33rd Annual Computer Security Application Conference ( , Orlando, Florida, December 2017 (Distinguished Paper Award).ACSAC'17 )
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage [bib]
Kevin Leach, Fengwei Zhang , and Westley Weimer
In Proceedings of the20th International Symposium on Research in Attacks, Intrusions and Defenses ( , Atlanta, Georgia, September 2017.RAID'17 )
Ninja: Towards Transparent Tracing and Debugging on ARM [bib]
Zhenyu Ning and Fengwei Zhang
In Proceedings of the26th USENIX Security Symposium ( , Vancouver, BC, Canada, August 2017.USENIX-Security'17 )
Using Asynchronous Collaborative Attestation to Build A Trusted Computing Environment for Mobile Applications [bib]
Lei Zhou, Fengwei Zhang , and Guojun Wang
In Proceedings of the3rd IEEE International Conference on Smart World Congress ( , Newark, California, August 2017.SWC'17 )
Position Paper: Challenges Towards Securing Hardware-assisted Execution Environments [bib]
Zhenyu Ning, Fengwei Zhang , Weisong Shi, and Larry Shi
In Proceedings of theHardware and Architectural Support for Security and Privacy( , in conjunction with TheHASP'17 )44th International Symposium on Computer Architecture ( , Toronto, ON, Canada, June 2017.ISCA'17 )
COMS: Customer Oriented Migration Service [bib]
Kai Huang, Xing Gao, Fengwei Zhang , and Jidong Xiao
In Proceedings of the10th IEEE International Conference on Cloud Computing ( , Honolulu, Hawaii, June 2017.CLOUD'17 )
Breaking BLE Beacons For Fun But Mostly Profit [bib]
Constantinos Kolias, Lucas Copi, Fengwei Zhang , and Angelos Stavrou
In Proceedings of the10th European Workshop on Systems Security ( , in conjunction with TheEuroSec'17 )12th European Conference on Computer Systems ( , Belgrade, Serbia, April 2017.EuroSys'17 )
SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security [bib]
Fengwei Zhang and Hongwei Zhang
In Proceedings of theHardware and Architectural Support for Security and Privacy ( , in conjunction with TheHASP'16 )43rd International Symposium on Computer Architecture ( , Seoul, South Korea, June 2016.ISCA'16 )
Towards Transparent Introspection [bib]
Kevin Leach, Chad Spensky, Westley Weime, and Fengwei Zhang
In Proceedings of the23rd IEEE Conference on Software Analysis, Evolution, and Reengineering ( , Osaka, Japan, March 2016.SANER'16 )
MobiPluto: File System Friendly Deniable Storage for Mobile Devices [bib]
Bing Chang, Zhan Wang, Bo Chen, and Fengwei Zhang
In Proceedings of the31st Annual Computer Security Applications Conference ( , Los Angeles, California, December 2015.ACSAC'15 )
Class-Chord: Efficient Messages to Classes of Nodes in Chord [bib]
Dan Fleck, Sharath Hiremagalore, Stephen Reese, Liam McGhee, and Fengwei Zhang
In Proceedings of the2nd IEEE International Conference on Cyber Security and Cloud Computing ( , New York City, New York, November 2015.CSCloud'15 )
Using Hardware Features for Increased Debugging Transparency [bib]
Fengwei Zhang , Kevin Leach, Angelos Stavrou, Haining Wang, and Kun Sun
In Proceedings of the36th IEEE Symposium on Security and Privacy ( , San Jose, California, May 2015.S&P'15 )
TrustLogin: Securing Password-Login on Commodity Operating Systems [bib]
Fengwei Zhang , Kevin Leach, Haining Wang, and Angelos Stavrou
In Proceedings of the10th ACM Symposium on Information, Computer and Communications Security ( , Singapore, April 2015.AsiaCCS'15 )
A Framework to Secure Peripherals at Runtime [bib]
Fengwei Zhang , Haining Wang, Kevin Leach, and Angelos Stavrou
In Proceedings of the19th European Symposium on Research in Computer Security ( , Wroclaw, Poland, September 2014.ESORICS'14 )
IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime (student paper) [bib]
Fengwei Zhang
In Proceedings of the43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks ( , Budapest, Hungary, June 2013.DSN'13 )
SPECTRE: A Dependable Introspection Framework via System Management Mode [bib]
Fengwei Zhang , Kevin Leach, Kun Sun, and Angelos Stavrou
In Proceedings of the43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks ( , Budapest, Hungary, June 2013.DSN'13 )
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes [bib]
Kun Sun, Jiang Wang, Fengwei Zhang , and Angelos Stavrou
In Proceedings of the19th Annual Network & Distributed System Security Symposium ( , San Diego, California, February 2012.NDSS'12 )
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensic [bib]
Jiang Wang, Fengwei Zhang , Kun Sun, and Angelos Stavrou
In Proceedings of the6th International Workshop on Systematic Approaches to Digital Forensic Engineering ( , in conjunction with TheSADFE'11 )32nd IEEE Symposium on Security and Privacy ( , Oakland, California, May 2011.S&P'11 )
Temporal Metrics for Software Vulnerabilities [bib]
Ju An Wang, Fengwei Zhang , and Min Xia
In Proceedings of the4th Annual Workshop on Cyber Security and Information Intelligence Research ( , Oak Ridge, Tennessee, May 2008.CSIIRW'08 )Journal Publications
-
SnapMem: Hardware/Software Cooperative Memory Resistant to Cache-Related Attacks on ARM-FPGA Embedded SoC
Jingquan Ge and Fengwei Zhang*
To Appear InIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems ( , 2024.TCAD'24 )
-
Armor: Protecting Software Against Hardware Tracing Techniques
Tai Yue, Fengwei Zhang* , Zhenyu Ning, Pengfei Wang, Xu Zhou*, Kai Lu, andLei Zhou
To Appear InIEEE Transactions on Information Forensics & Security ( , 2024. Impact Factor: 7.231.TIFS'24 ) -
Building a Lightweight Trusted Execution Environment for Arm GPUs
Chenxu Wangˆ, Yunjie Dengˆ, Zhenyu Ning, Kevin Leach, Jin Li, Shoumeng Yan, Zhengyu He, Jiannong Cao, and Fengwei Zhang*
To Appear InIEEE Transactions on Dependable and Secure Computing ( , 2024. Impact Factor: 7.329.TDSC'24 )
StrongBox project is online! [Web] -
Trusted Execution Environment: State-of-the-Art and Future Directions, 可信执行环境:现状与展望
Fengwei Zhang ,Lei Zhou, Yiming Zhang, Mingde Ren, Yunjie Deng; 张锋巍 ,周雷, 张一鸣, 任明德, 邓韵杰
In Proceedings of theJournal of Computer Research and Development《计算机研究与发展》61(1): 243-260, 2024.
-
Hardware-assisted Live Kernel Function Updating on Intel Platforms
Lei Zhou, Fengwei Zhang* , Kevin Leach, Xuhua Ding, Zhenyu Ning, Guojun Wang, and Jidong Xiao
To Appear InIEEE Transactions on Dependable and Secure Computing ( , 2023. Impact Factor: 7.329.TDSC'23 )
-
Revisiting ARM Debugging Features: Nailgun and Its Defense
Zhenyu Ning, Chenxu Wang, Yinhua Chen, Fengwei Zhang* , and Jiannong Cao
InIEEE Transactions on Dependable and Secure Computing ( , Vol.20, No.1, pp.574-589, 2023. Impact Factor: 6.404.TDSC'23 )
Nailgun project is online! [Web] -
STC-IDS: Spatial–temporal Correlation Feature Analyzing based Intrusion Detection System for Intelligent Connected Vehicles
Pengzhou Cheng, Mu Han, Aoxue Li, and Fengwei Zhang
InInternational Journal of Intelligent Systems ( , Vol.37, No.11, pp.9532-9561, 2022. Impact Factor: 8.993.IJIS'22 )
-
Efficient and DoS-resistant Consensus for Permissioned Blockchains
Xusheng Chen, Shixiong Zhao, Ji Qi, Jianyu Jiang, Haoze Song, Cheng Wang, Tsz On Li, Hubert Chan, Fengwei Zhang , Xiapu Luo, Sen Wang, Gong Zhang, and Heming Cui
InPerformance Evaluation ( , Volume 153, February 2022.PE'22 )
-
Securing Big Data Scientific Workflows via Trusted Heterogeneous Environments
Saeid Mofradˆ, Ishtiaq Ahmedˆ, Fengwei Zhang* , Shiyong Lu, Ping Yang, and Heming Cui
InIEEE Transactions on Dependable and Secure Computing ( , Vol.19, No.6, pp.4187-4203, 2022. Impact Factor: 6.404.TDSC'22 )
-
DAENet: Making Strong Anonymity Scale in a Fully Decentralized Network
Tianxiang Shen, Jianyu Jiang, Yunpeng Jiang, Xusheng Chen, Ji Qi, Shixiong Zhao, Fengwei Zhang* , Xiapu Luo, and Heming Cui*
InIEEE Transactions on Dependable and Secure Computing ( , Vol.19, No.4, pp.2286-2303, 2022. Impact Factor: 6.404.TDSC'22 ) -
Vacuum: An Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices
Li Yang, Cheng Li, Teng Wei, Fengwei Zhang , Jianfeng Ma, and Naixue Xiong
InIEEE Internet of Things Journal ( , 2021. 5-Year Impact Factor: 11.705.IoTJ'21 ) -
A Coprocessor-based Introspection Framework via Intel Management Engine
Lei Zhou, Fengwei Zhang* , Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding, and Guojun Wang
InIEEE Transactions on Dependable and Secure Computing ( , Vol.18, No.4, pp.1920-1932, 2021. Impact Factor: 6.404.TDSC'21 ) -
An Attribute-Isolated Secure Communication Architecture for Intelligent Connected Vehicles
Mu Han, Ailan Wan, Fengwei Zhang , and Shidian Ma
InIEEE Transactions on Intelligent Vehicle ( , Vol.5, No.4, pp.545-555, 2020. Impact Factor: 7.420.T-IV'20 ) -
RansomSpector: An Introspection-Based Approach to Detect Crypto Ransomware
Fei Tang, Boyang Ma, Jinku Li, Fengwei Zhang , Jipeng Su, Jianfeng Ma
InElsevier Computers & Security ( , Vol.97, 2020. Impact Factor: 3.579.CompSec'20 ) -
Nailgun: Breaking Privilege Isolation on ARM, 钉枪:突破ARM特权隔离
Fengwei Zhang and Zhenyu Ning, 张锋巍,宁振宇
InCommunications of China Computer Federation ( ,《中国计算机学会通讯》Vol.16, No.1, pp.51-54, 2020.CCCF'20 ) -
A Study of Using TEE on Edge Computing, 基于边缘计算的可信执行环境研究 [bib]
Zhenyu Ning, Fengwei Zhang* , and Weisong Shi, 宁振宇,张锋巍*,施巍松
InJournal of Computer Research and Development ( ,《计算机研究与发展》Vol.56, No.7, pp.1441-1453, 2019.JCDR'19 ) -
Hardware-assisted Transparent Tracing and Debugging on ARM [bib]
Zhenyu Ning and Fengwei Zhang
InIEEE Transactions on Information Forensics & Security ( , Vol.14, No.6, pp.1595-1609, 2019. Impact Factor: 5.824 (11/2018).TIFS'19 ) -
SADUS: Secure Data Deletion in User Space for Mobile Devices [bib]
Li Yang, Teng Wei, Fengwei Zhang , Jianfeng Ma
InElsevier Computers & Security ( , Vol.77, pp.612-626, 2018. Impact Factor: 2.849.CompSec'18 ) -
FINE-CFI: Fine-grained Control- Flow Integrity for Operating System Kernels [bib]
Jinku Li, Xiaomeng Tong, Fengwei Zhang , and Jianfeng Ma
InIEEE Transactions on Information Forensics & Security ( , Vol.13, No.6, pp.1535-1550, 2018. Impact Factor: 4.332.TIFS'18 ) -
User-Friendly Deniable Storage for Mobile Devices [bib]
Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang , Wen Tao Zhu, Yingjiu Li, and Zhan Wang
InElsevier Computers & Security ( , Vol.72, pp.163-174, 2018. Impact Factor: 2.849.CompSec'18 ) -
Towards Transparent Debugging [bib]
Fengwei Zhang , Kevin Leach, Angelos Stavrou, and Haining Wang
InIEEE Transactions on Dependable and Secure Computing ( , Vol.15, No.2, pp.321-335, 2018. Impact Factor: 4.410.TDSC'18 ) -
HyperCheck: A Hardware-Assisted Integrity Monitor [bib]
Fengwei Zhang , Jiang Wang, Kun Sun, and Angelos Stavrou
InIEEE Transactions on Dependable and Secure Computing ( , Vol.11, No.4, pp.332-344, July-August 2014.TDSC'14 ) -
Metrics for Information Security Vulnerabilities [bib]
Ju An Wang, Min Xia, and Fengwei Zhang
InJournal of Applied Global Research ( , Vol.1, No.1, pp.48-58, 2008.JAGR'08 )
Invited Keynote Publications
-
Keynote Talk: BadUSB-C: Revisiting BadUSB with Type-C
Fengwei Zhang
In Proceedings of the1st International Symposium on Advanced Security on Software and Systems( , in conjunction with theASSS'21 )16th ACM ASIA Conference on Computer and Communications Security ( , Hong Kong, China, June, 2021.AsiaCCS'21 )
Extended Our WOOT 2021 Paper with teaching materials of CS 315 Computer Security course.
Conference Poster Publications
-
Poster: SecTAG: Enhancing ARM Platform Security with Hardware Tags [bib]
Zhenyu Ning and Fengwei Zhang
In Proceedings of the40th IEEE Symposium on Security & Privacy ( , San Francisco, California, May, 2019.S&P'19 )
Technical Reports
-
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes [bib]
Kun Sun, Jiang Wang, Fengwei Zhang , and Angelos Stavrou
Technical Report GMU-CS-TR-2011-7, Department of Computer Science, George Mason University, Fairfax, VA, July, 2011. ( , 2011.TR-CS-GMU'11 )
Issued Patents
-
Methods and Systems for Increased Debugging Transparency [bib]
Fengwei Zhang , Kevin Leach, Angelos Stavrou, and Haining Wang
U.S. Patent Number 10,127,137. Issued on November 13, 2018.
Ph.D. Thesis