WUSTL

COMPUTER SECURITY & PRIVACY LABORATORY CSPL OPENINGS TEACHING PUBLICATION MEMBERS PROJECTS
Publications

System Security

Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution [PDF]
Y. Xiao, N. Zhang, W. Lou, Y.T. Hou
arXiv.org > cs > arXiv:1904.07275, 2019

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features
L. Tong, B. Li, C. Hajaj, C. Xiao, N. Zhang, Y. Vorobeychik
28th USENIX Security Symposium, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors
S. Wan, J. Sun, K. Sun, N. Zhang, Q. Li
49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices [PDF]
C. Cao, L. Guan, N. Zhang, N. Gao, J. Lin, B. Luo, P. Liu, J. Xiang and W. Lou
21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018

Forensic Challenges under Misused Architectural Features [PDF]
N. Zhang, R. Zhang, K. Sun, W. Lou, Y.T. Hou, Sushil Jajodia
IEEE Transactions on Information Forensics and Security (TIFS) 2018

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices [ PDF ]
N. Zhang, K. Sun, Deborah Shands, W. Lou, Y.T. Hou
IACR EPrint, 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors [PDF]
N. Zhang, K. Sun, W. Lou, Y.T. Hou
37th IEEE Symposium on Security and Privacy (Oakland), 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence [PDF]
N. Zhang, He Sun, K. Sun, W. Lou, Y.T. Hou
1st IEEE European Symposium on Security and Privacy (EuroS&P), 2016

Now You See Me: Hide and Seek in Physical Address Space [PDF]
N. Zhang, K. Sun, W. Lou, Y.T. Hou, Sushil Jajodia
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015

Enabling Trusted Data-Intensive Execution in Cloud Computing
N. Zhang, W. Lou, X. Jiang, Y.T. Hou
2nd IEEE Conference on Communications and Network Security (CNS), 2014

MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation
N. Zhang, M. Li, W. Lou, Y.T. Hou
IEEE Military Communications Conference (MILCOM), 2012

Network Security

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]
Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou
arXiv preprint arXiv:1904.04098, Apr, 2019.

[Book Chapter] Distributed Consensus Protocols and Algorithms [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y.T. Hou
Blockchain for Distributed Systems Security, First Edition. Wiley Sons, 2019

Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou and Y.T. Hou
IEEE Transactions on Information Forensics and Security (TIFS) 2018

[Position Paper] PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution [PDF]
N. Zhang, J. Li, W. Lou, Y.T. Hou
13th DPM International Workshop on Data Privacy Management (DPM 18)

TruSense: Information Leakage from TrustZone [PDF]
N. Zhang, K. Sun, Deborah Shands, W. Lou, Y.T. Hou
37th IEEE International Conference on Computer Communications (INFOCOM), 2018

Secure Remote Monitoring Framework Supporting Efficient Fine-grained Access Control and Data Processing in IoT
Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou and Y.T. Hou
14th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2018)

ROSTER: Radio Context Attestation in Cognitive Radio Network [PDF]
N. Zhang, W. Sun, W. Lou, Y.T. Hou, and W. Trappe
IEEE Conference on Communications and Network Security (IEEE CNS 2018)

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware
M. Alhanahnah, Q. Lin, Q. Yan, N. Zhang, and Z. Chen
IEEE Conference on Communications and Network Security (IEEE CNS) 2018

Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
W. Sun, N. Zhang, W. Lou, and Y.T. Hou
IEEE Conference on Communications and Network Security (IEEE CNS 2018)

Black Penguin: On the Feasibility of Detecting Intrusion with Homogeneous Memory
N. Zhang, R. Zhang, Q. Yan, W. Lou, Y.T. Hou, Danfeng Yao,
Network Forensic Workshop, IEEE Conference on Communications and Network Security (CNS), 2017

When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W. Sun, N. Zhang, W. Lou, Y.T. Hou
The 36th IEEE International Conference on Computer Communications (INFOCOM), 2017

From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality
R. Zhang, N. Zhang, Changlai Du, W. Lou, Y.T. Hou, Yuichi Kawamoto
ACM Transactions on Intelligent Systems and Technology (TIST), 2017

AugAuth: Shoulder-Surfing Resistant Authentication for Augmented Reality​
R. Zhang, N. Zhang, Changlai Du, W. Lou, Y.T. Hou, Yuichi Kawamoto
IEEE International Conference on Communications (ICC), 2017

Looks Good to Me: Authentication for Augmented Reality
Ethan Gaebel, N. Zhang, W. Lou, Y.T. Hou
6th International Workshop on Trustworthy Embedded Devices, 23rd ACM Conference on Computer and Communications Security (TRUSTED CCS), 2016

​Distributed Data Mining with Differential Privacy
N. Zhang, M. Li, W. Lou
IEEE International Conference on Communications (ICC), 2011