Haoqi Shan

According to our database1, Haoqi Shan authored at least 16 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger.
CoRR, 2024

Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
CoRR, 2024

2023
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight.
J. Hardw. Syst. Secur., September, 2023

PDNPulse: Sensing PCB Anomaly With the Intrinsic Power Delivery Network.
IEEE Trans. Inf. Forensics Secur., 2023

LightEMU: Hardware Assisted Fuzzing of Trusted Applications.
CoRR, 2023

Dual-Leak: Deep Unsupervised Active Learning for Cross-Device Profiled Side-Channel Leakage Analysis.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

When Memory Mappings Attack: On the (Mis)use of the ARM Cortex-M FPB Unit.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

HeisenTrojans: They Are Not There Until They Are Triggered.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2023

2022
A Review and Comparison of AI-enhanced Side Channel Analysis.
ACM J. Emerg. Technol. Comput. Syst., 2022

Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
TRRScope: Understanding Target Row Refresh Mechanism for Modern DDR Protection.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021

Cross-Device Profiled Side-Channel Attacks using Meta-Transfer Learning.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

2020
SaeCAS: Secure Authenticated Execution Using CAM-Based Vector Storage.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020

LAHEL: Lightweight Attestation Hardening Embedded Devices using Macrocells.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

Protecting Platoons from Stealthy Jamming Attack.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2020

2017
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017


  Loading...