You are here

Yinqian Zhang

  • Assistant Professor, Electrical & Computer Engr.
  • Assistant Professor, Computer Science & Engineering
  • 798 Dreese Laboratories
    2015 Neil Ave
    Columbus, OH 43210
  • 614-292-4202

Honors

  • 20170129

    Distinguished TPC Member Award.

  • 20160129

    Distinguished TPC Member Award.

Journal Articles

2018

  • Mi, Z.; Chen, H.; Zhang, Y.; Peng, S. et al., 2018, "CPU Elasticity to Mitigate Cross-VM Runtime Monitoring." IEEE Transactions on Dependable and Secure Computing

Presentations

  • "Tutorial: Cache Side Channels: State of the Art and Research Opportunities." 2017, Presented at The ACM Conference on Computer and Communications Security (CCS) 2017,
  • "SGX Side Channels." 2017, Presented at Cybersecurity Research Acceleration Workshop and Showcase,

Papers in Proceedings

2018

  • Zhang, X.; Wang, X.; Bai, X.; Zhang, Y. et al. "OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS." in Network and Distributed System Security Symposium (NDSS) 2018. (2 2018).
  • Chen, G.; Lai, T.; Reiter, M.; Zhang, Y. "Differentially Private Access Patterns for Searchable Symmetric Encryption." in IEEE International Conference on Computer Communications (INFOCOM) 2018. (4 2018).
  • Tang, D.; Zhou, Z.; Zhang, Y.; Zhang, K. "Face Flashing: A Secure Liveness Detection Protocol based on Light Reflections." in Network and Distributed System Security Symposium (NDSS) 2018. (2 2018).
  • Zhou, Z.; Qian, Z.; Reiter, M.K.; Zhang, Y. "Static Evaluation of Noninterference Using Approximate Model Counting." (7 2018).
  • Chen, S.; Liu, F.; Mi, Z.; Zhang, Y. et al. "Leveraging hardware transactional memory for cache side-channel defenses." (5 2018).
  • Chen, G.; Wang, W.; Chen, T.; Chen, S. et al. "Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races." (7 2018).
  • Chen, G.; Wang, W.; Zhang, T.; Chen, S. et al. "Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races." in IEEE Symposium on Security and Privacy 2018. (5 2018).

2017

  • Chen, S.; Zhang, X.; Reiter, M.K.; Zhang, Y. "Detecting privileged side-channel attacks in shielded execution with Déjà Vu." (4 2017).
  • Zhang, T.; Zhang, Y.; Lee, R.B. "DoS attacks on your memory in the cloud." (4 2017).
  • Xiao, Y.; Li, M.; Chen, S.; Zhang, Y. "Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves." in ACM Conference on Computer and Communications Security (CCS) 2017. (10 2017).
  • Xiao, Q.; Reiter, M.; Zhang, Y. "Personalized Pseudonyms for Servers in the Cloud." in Privacy Enhancing Technologies Symposium (PETS)2017. (7 2017).
  • Zhang, Y. "Cache side channels: State of the art and research opportunities." (10 2017).
  • Chen, S.; Zhang, X.; Reiter, M.; Zhang, Y. "Detecting Privileged Side-Channel Attacks in Shielded Execution with DEJA VU." in ACM Asia Conference on Computer and Communications Security (ASIACCS) 2017. (4 2017).
  • Zhang, T.; Zhang, Y.; Lee, R. "DoS Attacks on Your Memory in the Cloud." in 12th ACM Asia Conference on Computer and Communications Security (ASIACCS). (4 2017).
  • Wang, W.; Chen, G.; Pan, X.; Zhang, Y. et al. "Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX." in ACM Conference on Computer and Communications Security (CCS) 2017. (10 2017).

2016

  • Zhou, Z.; Reiter, M.K.; Zhang, Y. "A software approach to defeating side channels in last-level caches.." (1 2016).
  • Zhang, T.; Zhang, Y.; Lee, R.B. "Cloudradar: A real-time side-channel attack detection system in clouds." (1 2016).
  • Zhang, X.; Xiao, Y.; Zhang, Y. "Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices." in ACM Conference on Computer and Communications Security (CCS) 2016. (10 2016).
  • Zhou, Z.; Reiter, M.; Zhang, Y. "A Software Approach to Defeating Side Channels in Last-Level Caches." in ACM Conference on Computer and Communications Security (CCS) 2016. (10 2016).
  • Zhang, T.; Zhang, Y.; Lee, R. "CloudRadar: A Real-Time Side-Channel Attack Detection System in Clouds." in International Symposium on Research in Attacks, Intrusions and Defenses (RAID) 2016. (9 2016).
  • Zhou, Z.; Reiter, M.K.; Zhang, Y. "A software approach to defeating side channels in last-level caches." (10 2016).
  • Zhang, X.; Xiao, Y.; Zhang, Y. "Return-oriented Flush-Reload side channels on ARM and their implications for Android devices." (10 2016).

2015

  • Varadarajan, V.; Zhang, Y.; Ristenpart, T.; Swift, M. "A Placement Vulnerability Study in Multi-Tenant Public Clouds." in 24th USENIX Security Symposium. (8 2015).
  • Xiao, Q.; Reiter, M.; Zhang, Y. "Mitigating Storage Side Channels Using Statistical Privacy Mechanisms." in 22nd ACM Conference on Computer and Communications Security (CCS). (10 2015).
  • Xiao, Q.; Reiter, M.K.; Zhang, Y. "Mitigating Storage Side Channels Using Statistical Privacy Mechanisms.." (1 2015).
  • Xiao, Q.; Reiter, M.K.; Zhang, Y. "Mitigating storage side channels using statistical privacy mechanisms." (10 2015).
  • Qiuyu Xiao, Michael Reiter, Yinqian Zhang Mitigating Storage Side Channels Using Statistical Privacy Mechanisms. in ACM Conference on Computer and Communications Security. http://dl.acm.org/citation.cfm?id=2813645, (10 2015).
  • Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart, Michael Swift A Placement Vulnerability Study in Multi-Tenant Public Clouds. in 24th USENIX Security Symposium. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/varadarajan, (8 2015).
  • Varadarajan, V.; Zhang, Y.; Ristenpart, T.; Swift, M.M. "A Placement Vulnerability Study in Multi-tenant Public Clouds.." (1 2015).

2014

  • Zhang, Y.; Juels, A.; Reiter, M.K.; Ristenpart, T. "Cross-tenant side-channel attacks in PaaS clouds." (1 2014).
  • Zhang, Y.; Juels, A.; Reiter, M.; Ristenpart, T. "Cross-Tenant Side-Channel Attacks in PaaS Clouds.." in ACM Conference on Computer and Communications Security (CCS) 2015. (11 2014).
  • Zhang, Y.; Juels, A.; Reiter, M.K.; Ristenpart, T. "Cross-Tenant Side-Channel Attacks in PaaS Clouds.." (1 2014).

2013

  • Zhang, Y.; Reiter, M.K. "Düppel: retrofitting commodity operating systems to mitigate cache side channels in the cloud.." (1 2013).
  • Zhang, Y.; Reiter, M.K. "Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud." (12 2013).
  • Zhang, Y.; Reiter, M.K. "Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud." in 20th ACM Conference on Computer and Communications Security (CCS). (12 2013).

2012

  • Zhang, Y.; Juels, A.; Reiter, M.K.; Ristenpart, T. "Cross-VM side channels and their use to extract private keys." in 19th ACM Conference on Computer and Communications Security (CCS) 2012. (11 2012).
  • Zhang, Y.; Juels, A.; Reiter, M.K.; Ristenpart, T. "Cross-VM side channels and their use to extract private keys." (11 2012).
  • Zhang, Y.; Juels, A.; Reiter, M.K.; Ristenpart, T. "Cross-VM side channels and their use to extract private keys.." (1 2012).

2011

  • Zhang, Y.; Juels, A.; Oprea, A.; Reiter, M.K. "HomeAlone: Co-residency detection in the cloud via side-channel analysis." in 32nd IEEE Symposium on Security and Privacy (S&P) 2011. (8 2011).
  • Zhang, Y.; Juels, A.; Oprea, A.; Reiter, M.K. "HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.." (1 2011).
  • Zhang, Y.; Juels, A.; Oprea, A.; Reiter, M.K. "HomeAlone: Co-residency detection in the cloud via side-channel analysis." (8 2011).

2010

  • Zhang, Y.; Monrose, F.; Reiter, M.K. "The security of modern password expiration: an algorithmic framework and empirical analysis.." (1 2010).
  • Zhang, Y.; Monrose, F.; Reiter, M.K. "The security of modern password expiration: An algorithmic framework and empirical analysis." in 17th ACM Conference on Computer and Communications Security (CCS) 2010. (12 2010).
  • Zhang, Y.; Monrose, F.; Reiter, M.K. "The security of modern password expiration: An algorithmic framework and empirical analysis." (12 2010).

2008

  • Zhang, Y.; Fan, X.; Wang, Y.; Xue, Z. "Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences." in 24th Annual Computer Security Applications Conference (ACSAC) 2008. (12 2008).