Follow
Xiaokuan Zhang
Xiaokuan Zhang
Assistant Professor, Computer Science, George Mason University
Verified email at gmu.edu - Homepage
Title
Cited by
Cited by
Year
One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation
Y Xiao, X Zhang, Y Zhang, R Teodorescu
25th USENIX security symposium (USENIX Security 16), 19-35, 2016
2902016
Detecting privileged side-channel attacks in shielded execution with Déjá Vu
S Chen, X Zhang, MK Reiter, Y Zhang
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
2552017
Homonit: Monitoring smart home apps from encrypted traffic
W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2342018
{TXSPECTOR}: Uncovering attacks in ethereum from transactions
M Zhang, X Zhang, Y Zhang, Z Lin
29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020
902020
Return-oriented flush-reload side channels on arm and their implications for android devices
X Zhang, Y Xiao, Y Zhang
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
852016
Statistical privacy for streaming traffic
X Zhang, J Hamm, MK Reiter, Y Zhang
Proceedings of the 26th ISOC Symposium on network and distributed system …, 2019
472019
Os-level side channels without procfs: Exploring cross-app information leakage on ios
X Zhang, X Wang, X Bai, Y Zhang, XF Wang
Proceedings of the Symposium on Network and Distributed System Security, 2018
352018
You are where you have been: Sybil detection via geo-location analysis in OSNs
X Zhang, H Zheng, X Li, S Du, H Zhu
2014 IEEE Global Communications Conference, 698-703, 2014
302014
Surfacefleet: Exploring distributed interactions unbounded from device, application, user, and time
F Brudy, D Ledo, M Pahud, N Henry Riche, C Holz, A Waghmare, ...
Proceedings of the 33rd Annual ACM Symposium on User Interface Software and …, 2020
232020
A measurement study of authentication rate-limiting mechanisms of modern websites
B Lu, X Zhang, Z Ling, Y Zhang, Z Lin
Proceedings of the 34th annual computer security applications conference, 89-100, 2018
232018
Understanding and detecting mobile ad fraud through the lens of invalid traffic
S Sun, L Yu, X Zhang, M Xue, R Zhou, H Zhu, S Hao, X Lin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
162021
Dissecting click fraud autonomy in the wild
T Zhu, Y Meng, H Hu, X Zhang, M Xue, H Zhu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
132021
Narrator: Secure and practical state continuity for trusted execution in the cloud
J Niu, W Peng, X Zhang, Y Zhang
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
122022
Uncovering user interactions on smartphones via contactless wireless charging side channels
T Ni, X Zhang, C Zuo, J Li, Z Yan, W Wang, W Xu, X Luo, Q Zhao
2023 IEEE Symposium on Security and Privacy (SP), 3399-3415, 2023
62023
An empirical study on ethereum private transactions and the security implications
X Lyu, M Zhang, X Zhang, J Niu, Y Zhang, Z Lin
arXiv preprint arXiv:2208.02858, 2022
62022
Defeating traffic analysis via differential privacy: a case study on streaming traffic
X Zhang, J Hamm, MK Reiter, Y Zhang
International Journal of Information Security 21 (3), 689-706, 2022
52022
{PRIDWEN}: Universally Hardening {SGX} Programs via {Load-Time} Synthesis
F Sang, MW Shih, S Lee, X Zhang, M Steiner, M Vij, T Kim
2022 USENIX Annual Technical Conference (USENIX ATC 22), 455-472, 2022
42022
Exploiting Contactless Side Channels in Wireless Charging Power Banks for User Privacy Inference via Few-shot Learning
T Ni, J Li, X Zhang, C Zuo, W Wang, W Xu, X Luo, Q Zhao
Proceedings of the 29th Annual International Conference on Mobile Computing …, 2023
32023
Smartsec: Secret sharing-based location-aware privacy enhancement in smart devices
BB Chirchir, X Zhang, M Li, Q Qian, N Ruan, H Zhu
2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-6, 2015
32015
{POLICYCOMP}: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
L Zhou, C Wei, T Zhu, G Chen, X Zhang, S Du, H Cao, H Zhu
32nd USENIX Security Symposium (USENIX Security 23), 1073-1090, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20