Zhi Zhang

According to our database1, Zhi Zhang authored at least 13 papers between 2013 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2021
Detecting Hardware-Assisted Virtualization With Inconspicuous Features.
IEEE Trans. Inf. Forensics Secur., 2021

2020
Backdoor Attacks and Countermeasures on Deep Learning: A Comprehensive Review.
CoRR, 2020

PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses.
CoRR, 2020

GhostKnight: Breaching Data Integrity via Speculative Execution.
CoRR, 2020

DRAMDig: A Knowledge-assisted Tool to Uncover DRAM Address Mapping.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
TeleHammer : A Stealthy Cross-Boundary Rowhammer Technique.
CoRR, 2019

Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks.
CoRR, 2019

PiBooster: A Light-Weight Approach to Performance Improvements in Page Table Management for Paravirtual Virtual-Machines.
CoRR, 2019

2018
A Reliable and Practical Approach to Kernel Attack Surface Reduction of Commodity OS.
CoRR, 2018

Still Hammerable and Exploitable: on the Effectiveness of Software-only Physical Kernel Isolation.
CoRR, 2018

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2016
PiBooster: Performance Accelerations in Page Table Management for Paravirtual VMs.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2013
A Covert Channel Using Event Channel State on Xen Hypervisor.
Proceedings of the Information and Communications Security - 15th International Conference, 2013


  Loading...