Follow
Zihao Zhan
Zihao Zhan
Verified email at ufl.edu
Title
Cited by
Cited by
Year
Leveraging em side-channel information to detect rowhammer attacks
Z Zhang, Z Zhan, D Balasubramanian, B Li, P Volgyesi, X Koutsoukos
2020 IEEE Symposium on Security and Privacy (SP), 729-746, 2020
352020
Triggering rowhammer hardware faults on arm: A revisit
Z Zhang, Z Zhan, D Balasubramanian, X Koutsoukos, G Karsai
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware …, 2018
302018
Bitjabber: The world’s fastest electromagnetic covert channel
Z Zhan, Z Zhang, X Koutsoukos
2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020
262020
Invisible finger: Practical electromagnetic interference attack on touchscreen-based electronic devices
H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin
2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022
182022
Graphics peeping unit: Exploiting em side-channel information of gpus to eavesdrop on your neighbors
Z Zhan, Z Zhang, S Liang, F Yao, X Koutsoukos
2022 IEEE Symposium on Security and Privacy (SP), 1440-1457, 2022
162022
Clairvoyance: exploiting far-field em emanations of gpu to" see" your dnn models through obstacles at a distance
S Liang, Z Zhan, F Yao, L Cheng, Z Zhang
2022 IEEE Security and Privacy Workshops (SPW), 312-322, 2022
52022
A high-speed, long-distance and wall-penetrating covert channel based on em emanations from dram clock
Z Zhan, Z Zhang, X Koutsoukos
Journal of Hardware and Systems Security 6 (1), 47-65, 2022
22022
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger
Z Zhan, Y Yang, H Shan, H Wang, Y Jin, S Wang
arXiv preprint arXiv:2402.11423, 2024
2024
Programmable EM Sensor Array for Golden-Model Free Run-time Trojan Detection and Localization
H Wang, M Panoff, Z Zhan, S Wang, C Bobda, D Forte
arXiv preprint arXiv:2401.12193, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–9