WUSTL

COMPUTER SECURITY & PRIVACY LABORATORY CSPL OPENINGS TEACHING PUBLICATION MEMBERS PROJECTS
Publications

System Security

Remotely Controlling TrustZone Applications? A Study on Securely and Resiliently Receiving Remote Commands
S. Wan, K. Sun, N. Zhang, and Y Li
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2021

Messy States of Wiring: Vulnerabilities in Emerging Personal Payment Systems
J. Lou, X. Yuan, and N. Zhang
30th USENIX Security Symposium, 2021

RusTEE: Developing Memory-Safe ARM TrustZone Application [PDF]
S. Wan, M. Sun, K. Sun, N. Zhang, X. He
Annual Computer Security Applications Conference (ACSAC), 2020

Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y.T. Hou
25th European Symposium on Research in Computer Security (ESORICS), 2020

Bit2RNG: Leveraging Bad-page Initialized Table with Bit-error Insertion for True Random Number Generation in Commodity Flash Memory [PDF]
W. Yan, H. Zhu, Z. Yu, F. Tehranipoor, J. Chandy, N. Zhang, X. Zhang
IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020

SurfingAttack: Interactive Hidden Attack on Voice Assistants Using Ultrasonic Guided Waves [Website] [PDF]
Q. Yan, K. Liu, Q. Zhou, H.Guo, N. Zhang
Network and Distributed System Security Symposium (NDSS), 2020

Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning [PDF]
L. Tong, A. Laszka, C. Yan, N. Zhang, Y. Vorobeychik
34th AAAI Conference on Artificial Intelligence (AAAI), 2020

Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features [PDF]
L. Tong, B. Li, C. Hajaj, C. Xiao, N. Zhang, Y. Vorobeychik
28th USENIX Security Symposium, 2019

SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors [PDF]
S. Wan, J. Sun, K. Sun, N. Zhang, Q. Li
49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019

CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices [PDF]
C. Cao, L. Guan, N. Zhang, N. Gao, J. Lin, B. Luo, P. Liu, J. Xiang and W. Lou
21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2018

Forensic Challenges under Misused Architectural Features [PDF]
N. Zhang, R. Zhang, K. Sun, W. Lou, Y.T. Hou, Sushil Jajodia
IEEE Transactions on Information Forensics and Security (TIFS) 2018

TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices [PDF]
N. Zhang, K. Sun, D. Shands, W. Lou, Y.T. Hou
IACR EPrint, 2016

CaSE: Cache-Assisted Secure Execution on ARM Processors [PDF]
N. Zhang, K. Sun, W. Lou, Y.T. Hou
37th IEEE Symposium on Security and Privacy (Oakland), 2016

CacheKit: Evading Memory Introspection Using Cache Incoherence [PDF]
N. Zhang, He Sun, K. Sun, W. Lou, Y.T. Hou
1st IEEE European Symposium on Security and Privacy (EuroS&P), 2016

Now You See Me: Hide and Seek in Physical Address Space [PDF]
N. Zhang, K. Sun, W. Lou, Y.T. Hou, Sushil Jajodia
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2015

Distributed System Security

Session Key Distribution Made Practical for CAN and CAN-FD Message Authentication [PDF]
Y. Xiao, S. Shi, N. Zhang, W. Lou, Y. Hou
Annual Computer Security Applications Conference (ACSAC), 2020

PrivacyScope: Automatic Analysis of Private Data Leakage in TEE-Protected Applications [PDF]
R. Zhang, N. Zhang, A. Moini, W. Lou and Y.T. Hou
40th IEEE International Conference on Distributed Computing Systems (ICDCS), 2020

PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications
W Yan, N Zhang, LL Njilla, X Zhang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2020

Modeling the Impact of Network Connectivity on Consensus Security of Proof-of-Work Blockchain [PDF]
Y. Xiao, N. Zhang, W. Lou, Y.T. Hou
39th IEEE International Conference on Computer Communications (INFOCOM), 2020

A Survey of Distributed Consensus Protocols for Blockchain Networks [PDF]
Y. Xiao, N. Zhang, W. Lou, and Y. T. Hou
IEEE Communications Surveys and Tutorials, 2020

PCBChain: Lightweight Reconfigurable Blockchain Primitives for Secure IoT Applications
W Yan, N Zhang, LL Njilla, X Zhang
IEEE Transactions on Very Large Scale Integration (VLSI) Systems

Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles
X. Li, Y. Ren, L. Yang, N. Zhang, B. Luo, J. Weng, X. Liu
Transactions on Network Science and Engineering, 2020

PriRoster: Privacy-preserving Radio Context Attestation in Cognitive Radio Network
R. Zhang, N. Wang, N Zhang, Z Yan, W. Lou and T. Hou
IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN) 2019

[Book Chapter] Distributed Consensus Protocols and Algorithms [PDF]
Y. Xiao, N. Zhang, J. Li, W. Lou, Y.T. Hou
Blockchain for Distributed Systems Security, First Edition. Wiley Sons, 2019

Towards Efficient Fine-grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT
Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou and Y.T. Hou
IEEE Transactions on Information Forensics and Security (TIFS) 2018

[Position Paper] PrivacyGuard: Enforcing Private Data Usage with Blockchain and Attested Execution [PDF]
N. Zhang, J. Li, W. Lou, Y.T. Hou
13th DPM International Workshop on Data Privacy Management (DPM 18)

TruSense: Information Leakage from TrustZone [PDF]
N. Zhang, K. Sun, Deborah Shands, W. Lou, Y.T. Hou
37th IEEE International Conference on Computer Communications (INFOCOM), 2018

Secure Remote Monitoring Framework Supporting Efficient Fine-grained Access Control and Data Processing in IoT
Y. Chen, W. Sun, N. Zhang, Q. Zheng, W. Lou and Y.T. Hou
14th International Conference on Security and Privacy in Communication Networks (SECURECOMM 2018)

ROSTER: Radio Context Attestation in Cognitive Radio Network [PDF]
N. Zhang, W. Sun, W. Lou, Y.T. Hou, and W. Trappe
IEEE Conference on Communications and Network Security (IEEE CNS 2018)

Efficient Signature Generation for Classifying Cross-Architecture IoT Malware
M. Alhanahnah, Q. Lin, Q. Yan, N. Zhang, and Z. Chen
IEEE Conference on Communications and Network Security (IEEE CNS) 2018

Tapping the Potential: Secure Chunk-based Deduplication of Encrypted Data for Cloud Backup
W. Sun, N. Zhang, W. Lou, and Y.T. Hou
IEEE Conference on Communications and Network Security (IEEE CNS 2018)

Black Penguin: On the Feasibility of Detecting Intrusion with Homogeneous Memory
N. Zhang, R. Zhang, Q. Yan, W. Lou, Y.T. Hou, Danfeng Yao,
Network Forensic Workshop, IEEE Conference on Communications and Network Security (CNS), 2017

When Gene Meets Cloud: Enabling Scalable and Efficient Range Query on Encrypted Genomic Data
W. Sun, N. Zhang, W. Lou, Y.T. Hou
The 36th IEEE International Conference on Computer Communications (INFOCOM), 2017

From Electromyogram to Password: Exploring the Privacy Impact of Wearables in Augmented Reality
R. Zhang, N. Zhang, Changlai Du, W. Lou, Y.T. Hou, Yuichi Kawamoto
ACM Transactions on Intelligent Systems and Technology (TIST), 2017

AugAuth: Shoulder-Surfing Resistant Authentication for Augmented Reality‚Äč
R. Zhang, N. Zhang, Changlai Du, W. Lou, Y.T. Hou, Yuichi Kawamoto
IEEE International Conference on Communications (ICC), 2017

Looks Good to Me: Authentication for Augmented Reality
Ethan Gaebel, N. Zhang, W. Lou, Y.T. Hou
6th International Workshop on Trustworthy Embedded Devices, 23rd ACM Conference on Computer and Communications Security (TRUSTED CCS), 2016

Enabling Trusted Data-Intensive Execution in Cloud Computing
N. Zhang, W. Lou, X. Jiang, Y.T. Hou
2nd IEEE Conference on Communications and Network Security (CNS), 2014

MUSHI: Toward Multiple Level Security Cloud with Strong Hardware Level Isolation
N. Zhang, M. Li, W. Lou, Y.T. Hou
IEEE Military Communications Conference (MILCOM), 2012

‚ÄčDistributed Data Mining with Differential Privacy
N. Zhang, M. Li, W. Lou
IEEE International Conference on Communications (ICC), 2011