Haoqi Shan
Haoqi Shan
Verified email at
Cited by
Cited by
Cross-device profiled side-channel attacks using meta-transfer learning
H Yu, H Shan, M Panoff, Y Jin
2021 58th ACM/IEEE Design Automation Conference (DAC), 703-708, 2021
Inside Radio: An Attack and Defense Guide
Q Yang, L Huang
Springer, 2018
Invisible finger: Practical electromagnetic interference attack on touchscreen-based electronic devices
H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin
2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022
A review and comparison of ai-enhanced side channel analysis
M Panoff, H Yu, H Shan, Y Jin
ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022
PDNPulse: Sensing PCB anomaly with the intrinsic power delivery network
H Zhu, H Shan, D Sullivan, X Guo, Y Jin, X Zhang
IEEE Transactions on Information Forensics and Security, 2023
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback
Y Zheng, L Huang, H Shan, J Li, Q Yang, W Xu
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
LTE redirection: Forcing targeted LTE cellphone into unsafe network
W Zhang, H Shan
Proc. Defcon, 2016
Trrscope: Understanding target row refresh mechanism for modern ddr protection
Y Jiang, H Zhu, H Shan, X Guo, X Zhang, Y Jin
2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021
LAHEL: Lightweight attestation hardening embedded devices using macrocells
O Arias, D Sullivan, H Shan, Y Jin
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
Protecting platoons from stealthy jamming attack
Y Hu, H Shan, RG Dutta, Y Jin
2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2020
SaeCAS: secure authenticated execution using CAM-based vector storage
O Arias, D Sullivan, H Shan, Y Jin
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020
Man in the NFC
H Shan, J Yuan
Code Blue, 1-30, 2017
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight
H Shan, M Huang, Y Liu, S Nissankararao, Y Jin, S Wang, D Sullivan
Journal of Hardware and Systems Security 7 (2), 44-54, 2023
Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis
H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin
2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023
Noise2clean: cross-device side-channel traces denoising with unsupervised deep learning
H Yu, M Wang, X Song, H Shan, H Qiu, J Wang, K Yang
Electronics 12 (4), 1054, 2023
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers
Y Zheng, H Shan
HITB 2016 Amsterdam, 23, 2016
Build a cellular traffic sniffier with femoto cell
Y Zheng, H Shan
LightEMU: Hardware Assisted Fuzzing of Trusted Applications
H Shan, S Nissankararao, Y Liu, M Huang, S Wang, Y Jin, D Sullivan
IEEE International Symposium on Hardware Oriented Security and Trust, 2024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Z Zhan, Y Yang, H Shan, H Wang, Y Jin, S Wang
arXiv preprint arXiv:2402.11423, 2024
HeisenTrojans: They Are Not There Until They Are Triggered
AR Mavurapu, H Shan, X Guo, O Arias, D Sullivan
Asian Hardware Oriented Security and Trust Symposium, 2023
The system can't perform the operation now. Try again later.
Articles 1–20