Publications

    Author name denotes that the first author is/was a student in my lab, and * indicates equal contribution.

Selected

  1. GPU Memory Exploitation for Fun and Profit
    Y. Guo*, Z. Zhang*, J. Yang
    USENIX Security Symposium (Security), 2024

  2. Invalidate+Compare: A Timer-Free GPU Cache Attack Primitive
    Z. Zhang, K. Cai, Y. Guo, F. Yao, X. Gao
    USENIX Security Symposium (Security), 2024

  3. TunneLs for Bootlegging: Fully Reverse-Engineering GPU TLBs for Challenging Isolation Guarantees of NVIDIA MIG
    Z. Zhang, T. Allen, F. Yao, X. Gao, R. Ge
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2023

  4. Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors
    Z. Zhan*, Z. Zhang*, S. Liang, F. Yao, X. Koutsoukos
    IEEE Symposium on Security and Privacy (Oakland), 2022

  5. Leveraging EM Side-Channel Information to Detect Rowhammer Attacks
    Z. Zhang*, Z. Zhan*, D. Balasubramanian, B. Li, P. Volgyesi, X. Koutsoukos
    IEEE Symposium on Security and Privacy (Oakland), 2020


Other

  1. Toward Understanding the Security of Plugins in Continuous Integration Services
    X. Li, Y. Gu, C. Qiao, Z. Zhang, D. Liu, L. Ying, H. Duan, X. Gao
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2024

  2. DeepVenom: Persistent DNN Backdoors Exploiting Transient Weight Perturbations in Memories
    K. Cai, M. Chowdhuryy, Z. Zhang, F. Yao
    IEEE Symposium on Security and Privacy (Oakland), 2024

  3. PowSpectre: Powering Up Speculation Attacks with TSX-based Replay
    M. Chowdhuryy, Z. Zhang, F. Yao
    ACM Asia Conference on Computer and Communications Security (ASIACCS), 2024

  4. FreeEM: Uncovering Parallel Memory EMR Covert Communication in Volatile Environments
    S. Yu, J. Fu, C. Jiang, C. Lin, Z. Zhang, L. Cheng, M. Li, X. Zhang, L. Guo
    ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2024

  5. BeKnight: Guarding Against Information Leakage in Speculatively Updated Branch Predictors
    M. Chowdhuryy, Z. Zhang, F. Yao
    IEEE International Conference on Computer-Aided Design (ICCAD), 2023

  6. mmFingerprint: A New Application Fingerprinting Technique via mmWave Sensing and Its Use in Rowhammer Detection
    S. Liang, Z. Li, C. Jiang, L. Guo, Z. Zhang
    EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP), 2023

  7. A Vision Transformer Architecture for Open Set Recognition
    F. Cai, Z. Zhang, J, Liu, X. Koutsoukos
    IEEE International Conference on Machine Learning and Applications (ICMLA), 2022

  8. LockedDown: Exploiting Contention on Host-GPU PCIe Bus for Fun and Profit
    M. Side, F. Yao, Z. Zhang
    IEEE European Symposium on Security and Privacy (EuroS&P), 2022

  9. Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance
    S. Liang, Z. Zhan, F. Yao, L. Cheng, Z. Zhang
    IEEE Workshop on Offensive Technologies (WOOT), 2022

  10. A High-Speed, Long-Distance and Wall-Penetrating Covert Channel Based on EM Emanations from DRAM Clock
    Z. Zhan, Z. Zhang, X. Koutsoukos
    Journal of Hardware and Systems Security, 2022

  11. Log4shell: Redefining the Web Attack Surface
    D. Everson, L. Cheng, Z. Zhang
    Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb), 2022

  12. NMT-Stroke: Diverting Neural Machine Translation through Hardware-based Faults
    K. Cai, M. Chowdhuryy, Z. Zhang, F. Yao
    IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2021

  13. Red Alert for Power Leakage: Exploiting Intel RAPL-Induced Side Channels
    Z. Zhang, S. Liang, F. Yao, X. Gao
    ACM Asia Conference on Computer and Communications Security (ASIACCS), 2021
    (Acceptance Rate: 18.9%) (Preprint)

  14. Data Space Randomization for Securing Cyber-Physical Systems
    B. Potteiger, F. Cai, Z. Zhang, X. Koutsoukos
    International Journal of Information Security, 2021

  15. BitJabber: The World’s Fastest Electromagnetic Covert Channel
    Z. Zhan, Z. Zhang, X. Koutsoukos
    IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2020
    (Acceptance Rate: 28.8%) (Best Paper Nominee) (Preprint)

  16. Security in Mixed Time and Event Triggered Cyber-Physical Systems using Moving Target Defense
    B. Potteiger, F. Cai, A. Dubey, Z. Zhang, X. Koutsoukos
    IEEE International Symposium on Real-Time Distributed Computing (ISORC), 2020
    (Best Paper Nominee)

  17. Integrated Moving Target Defense and Control Reconfiguration for Securing Cyber-Physical Systems
    B. Potteiger, Z. Zhang, X. Koutsoukos
    Microprocessors and Microsystems, 2020

  18. A Model-Based Design Approach for Simulation and Virtual Prototyping of Automotive Control Systems Using Port-Hamiltonian Systems
    S. Dai, Z. Zhang, X. Koutsoukos
    Software & Systems Modeling, 2020

  19. Integrated Data Space Randomization and Control Reconfiguration for Securing Cyber-Physical Systems
    B. Potteiger, Z. Zhang, X. Koutsoukos
    Annual Symposium and Bootcamp on Hot Topics in the Science of Security (HoTSoS), 2019
    (Best Paper Award)

  20. Dynamic Symbolic Execution for the Analysis of Web Server Applications in Java
    D. Balasubramanian, Z. Zhang, D. McDermet, G. Karsai
    ACM/SIGAPP Symposium On Applied Computing (SAC), 2019

  21. Triggering Rowhammer Hardware Faults on ARM: A Revisit
    Z. Zhang, Z. Zhan, D. Balasubramanian, X. Koutsoukos, G. Karsai
    Workshop on Attacks and Solutions in Hardware Security (ASHES), 2018

  22. Integrated Instruction Set Randomization and Control Reconfiguration for Securing Cyber-Physical Systems
    B. Potteiger, Z. Zhang, X. Koutsoukos
    Annual Symposium and Bootcamp on Hot Topics in the Science of Security (HoTSoS), 2018

  23. Integrating Cache-Related Preemption Delay into Global-EDF Analysis for Multiprocessor Scheduling
    Y. Zhang, Z. Guo, L. Wang, H. Xiong, Z. Zhang
    IEEE International Conference On Embedded Software and Systems (ICESS), 2017

  24. Handling Write Backs in Multi-Level Cache Analysis for WCET Estimation
    Z. Zhang, Z. Guo, X. Koutsoukos
    International Conference on Real-Time Networks and Systems (RTNS), 2017

  25. Cache-Related Preemption Delay Analysis for Multi-Level Inclusive Caches
    Z. Zhang, X. Koutsoukos
    ACM SIGBED International Conference on Embedded Software (EMSOFT), 2016
    (Acceptance Rate: 25%)

  26. Precise Multi-Level Inclusive Cache Analysis for WCET Estimation
    Z. Zhang, X. Koutsoukos
    IEEE Real-Time Systems Symposium (RTSS), 2015
    (Acceptance Rate: 22.5%)

  27. Top-Down and Bottom-Up Multi-Level Cache Analysis for WCET Estimation
    Z. Zhang, X. Koutsoukos
    IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), 2015
    (Acceptance Rate: 21.8%)

  28. Improving the Precision of Abstract Interpretation Based Cache Persistence Analysis
    Z. Zhang, X. Koutsoukos
    ACM SIGPLAN/SIGBED Conference on Languages, Compilers and Tools for Embedded Systems (LCTES), 2015
    (Acceptance Rate: 25%)

  29. Generic Value-Set Analysis on Low-Level Code
    Z. Zhang, X. Koutsoukos
    Analytic Virtual Integration of Cyber-Physical Systems Workshop (AVICPS), 2014

  30. A Co-Simulation Framework for Design of Time-Triggered Automotive Cyber Physical Systems
    Z. Zhang, E. Eyisi, X. Koutsoukos, J. Porter, G. Karsai, J. Sztipanovits
    Simulation Modelling Practice and Theory, 2014

  31. Modeling Time-Triggered Ethernet in SystemC/TLM for Virtual Prototyping of Cyber-Physical Systems
    Z. Zhang, X. Koutsoukos
    International Embedded Systems Symposium (IESS), 2013

  32. Co-Simulation Framework for Design of Time-Triggered Cyber Physical Systems
    Z. Zhang, E. Eyisi, X. Koutsoukos, J. Porter, G. Karsai, J. Sztipanovits
    ACM/IEEE International Conference on Cyber Physical Systems (ICCPS), 2013
    (Acceptance Rate: 23.3%)

  33. A Case Study on the Model-Based Design and Integration of Automotive Cyber-Physical Systems
    D. Shang, E. Eyisi, Z. Zhang, X. Koutsoukos, J. Porter, G. Karsai, J. Sztipanovits
    Mediterranean Conference on Control and Automation (MED), 2013

  34. Model-Based Control Design and Integration of Cyber-Physical Systems: An Adaptive Cruise Control Case Study
    E. Eyisi, Z. Zhang, X. Koutsoukos, J. Porter, G. Karsai, J. Sztipanovits
    Journal of Control Science and Engineering, 2013

  35. A Simulation Framework for Design of Mixed Time/Event-Triggered Distributed Control Systems with SystemC/TLM
    Z. Zhang, J. Porter, X. Koutsoukos, J. Sztipanovits
    Analytic Virtual Integration of Cyber-Physical Systems Workshop (AVICPS), 2012

  36. High Confidence Embedded Software Design: A Quadrotor Helicopter Case Study
    Z. Zhang, J. Porter, N. Kottenstette, X. Koutsoukos, J. Sztipanovits
    ACM SIGBED Review, 2011