Fan Zhang

Orcid: 0000-0001-6087-8243

Affiliations:
  • Zhejiang University, College of Information Science and Electronic Engineering, Hangzhou, China
  • University of Connecticut, Storrs, CT, USA (PhD 2011)


According to our database1, Fan Zhang authored at least 85 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains.
IEEE Trans. Mob. Comput., May, 2024

DDoS family: A novel perspective for massive types of DDoS attacks.
Comput. Secur., March, 2024

SHAPER: A General Architecture for Privacy-Preserving Primitives in Secure Machine Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Constructing Cyber-Physical System Testing Suites Using Active Sensor Fuzzing.
IEEE Trans. Software Eng., November, 2023

VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023

Extending the classical side-channel analysis framework to access-driven cache attacks.
Comput. Secur., June, 2023

SAGE: Steering the Adversarial Generation of Examples With Accelerations.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Persistent Fault Analysis with Small Number of Chosen Plaintexts.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

RAFA: Redundancies-assisted Algebraic Fault Analysis and its implementation on SPN block ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

STAMP-Single Trace Attack on M-LWE Pointwise Multiplication in Kyber.
IACR Cryptol. ePrint Arch., 2023

DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

FaultMorse: An automated controlled-channel attack via longest recurring sequence.
Comput. Secur., 2023

Work-in-Progress: Towards Real-Time IDS via RNN and Programmable Switches Co-Designed Approach.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

InfoMasker: Preventing Eavesdropping Using Phoneme-Based Noise.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

GameRTS: A Regression Testing Framework for Video Games.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Stalker: A Framework to Analyze Fragility of Cryptographic Libraries under Hardware Fault Models.
Proceedings of the 60th ACM/IEEE Design Automation Conference, 2023

Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Purifier: Defending Data Inference Attacks via Transforming Confidence Scores.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Free Fault Leakages for Deep Exploitation: Algebraic Persistent Fault Analysis on Lightweight Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

On Efficient and Secure Code-based Masking: A Pragmatic Evaluation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Wavesdropper: Through-wall Word Detection of Human Speech via Commercial mmWave Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Snowball: Another View on Side-Channel Key Recovery Tools.
IACR Cryptol. ePrint Arch., 2022

AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation.
Comput. Secur., 2022

FakeGuard: Exploring Haptic Response to Mitigate the Vulnerability in Commercial Fingerprint Anti-Spoofing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Terminator on SkyNet: a practical DVFS attack on DNN hardware IP for UAV object detection.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

DARPT: defense against remote physical attack based on TDC in multi-tenant scenario.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
Stealthy and Robust Glitch Injection Attack on Deep Learning Accelerator for Target With Variational Viewpoint.
IEEE Trans. Inf. Forensics Secur., 2021

Design and Evaluation of Fluctuating Power Logic to Mitigate Power Analysis at the Cell Level.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

Pushing the Limit of PFA: Enhanced Persistent Fault Analysis on Block Ciphers.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021

G2F: A Secure User Authentication for Rapid Smart Home IoT Management.
IEEE Internet Things J., 2021

Towards Understanding and Demystifying Bitcoin Mixing Services.
Proceedings of the WWW '21: The Web Conference 2021, 2021

2020
A Systematic Evaluation of Wavelet-Based Attack Framework on Random Delay Countermeasures.
IEEE Trans. Inf. Forensics Secur., 2020

Persistent Fault Attack in Practice.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks.
IEEE Trans. Computers, 2020

Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE.
IEEE Trans. Computers, 2020

A Framework of Private Set Intersection Protocols.
IACR Cryptol. ePrint Arch., 2020

Defending Model Inversion and Membership Inference Attacks via Prediction Purification.
CoRR, 2020

Theoretical analysis of persistent fault attack.
Sci. China Inf. Sci., 2020

Active fuzzing for testing and securing cyber-physical systems.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis across Devices.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
Managing Recurrent Virtual Network Updates in Multi-Tenant Datacenters: A System Perspective.
IEEE Trans. Parallel Distributed Syst., 2019

Passive Attacks Against Searchable Encryption.
IEEE Trans. Inf. Forensics Secur., 2019

One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis.
IACR Cryptol. ePrint Arch., 2019

Understanding Rowhammer Attacks through the Lens of a Unified Reference Framework.
CoRR, 2019

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem.
IEEE Access, 2019

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Persistent Fault Injection in FPGA via BRAM Modification.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Adversarial Structured Neural Network Pruning.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Fluctuating Power Logic: SCA Protection by $V_{DD}$ Randomization at the Cell-level.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2019

2018
Persistent Fault Analysis on Block Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition.
Frontiers Inf. Technol. Electron. Eng., 2018

Efficient flush-reload cache attack on scalar multiplication based signature algorithm.
Sci. China Inf. Sci., 2018

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2018

An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units.
IEEE Access, 2018

Efficient Approximate Algorithms for the Closest Pair Problem in High Dimensional Spaces.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Improved Differential Fault Analysis on LED with Constraint Equations: Towards Reaching Its Limit.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Optimized Lightweight Hardware Trojan-Based Fault Attack on DES.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

A Wavelet-based Power Analysis Attack against Random Delay Countermeasure.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2018

2017
Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher.
Secur. Commun. Networks, 2017

Improved Differential Fault Analysis of SOSEMANUK with Algebraic Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers.
Sci. China Inf. Sci., 2017

Transistor level SCA-resistant scheme based on fluctuating power logic.
Sci. China Inf. Sci., 2017

Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016

一种基于量子密码的卫星网络窃听攻击检测方法 (Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography).
计算机科学, 2016

RGB-D Camera based Human Limb Movement Recognition and Tracking in Supine Positions.
Proceedings of the Advances in Multimedia Information Processing - PCM 2016, 2016

2014
Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations.
IEEE Trans. Inf. Forensics Secur., 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

2013
Efficient Hamming weight-based side-channel cube attacks on PRESENT.
J. Syst. Softw., 2013

Enhanced Side-Channel Cube Attacks on PRESENT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES.
Comput. Secur., 2013

Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques.
Proceedings of the 2013 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2013

Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Algebraic Differential Fault Attacks on LED using a Single Fault Injection.
IACR Cryptol. ePrint Arch., 2012

MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

2011
Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2008
Chord-Based Key Establishment Schemes for Sensor Networks.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Making register file resistant to power analysis attacks.
Proceedings of the 26th International Conference on Computer Design, 2008


  Loading...