Juchuan Zhang

ORCID: 0000-0001-7319-7535
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Cryptographic Implementations and Security
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Digital Media Forensic Detection
  • Network Security and Intrusion Detection
  • Context-Aware Activity Recognition Systems
  • Wireless Signal Modulation Classification
  • Metallurgical and Alloy Processes
  • Advanced materials and composites
  • Chaos-based Image/Signal Encryption
  • Speech and Audio Processing
  • Speech and dialogue systems
  • Biometric Identification and Security
  • Spam and Phishing Detection
  • EEG and Brain-Computer Interfaces
  • Metal and Thin Film Mechanics
  • Speech Recognition and Synthesis

Zhejiang University
2018-2023

With the widespread use of smart devices, device authentication has received much attention. One popular method for is to utilize internally-measured fingerprints, such as ID, software or hardware-based characteristics. In this paper, we propose DeMiCPU, a stimulation-response-based fingerprinting technique that relies on externally-measured information, i.e., magnetic induction (MI) signals emitted from CPU module consists chip and its affiliated power supply circuits. The key insight...

10.1145/3319535.3339810 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2019-11-06

Fake base station (FBS) crime is a type of wireless communication that has appeared recently. The key to enforcing the laws on regulating FBS based not only arrest but also convict criminals effectively. Much work discovering, localization, and tracking can assist arresting, problem collecting evidence accurately support proper conviction been addressed yet.

10.1145/3196494.3196521 article EN 2018-05-29

Voice assistants can be manipulated by various malicious voice commands, yet existing attacks require a nearby speaker to play the attack commands. In this paper, we show that even when no speakers are available, commands utilizing capacitors inside electronic devices, i.e., convert into and call it CapSpeaker. Essentially, emit acoustic noises due inverse piezoelectric effect, varying voltage across capacitor make vibrate thus noises. Forcing is challenging because (1) frequency responses...

10.1145/3460120.3485389 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Air-gapped networks achieve security by using the physical isolation to keep computers and network from Internet. However, magnetic covert channels based on CPU utilization have been proposed help secret data escape Faraday-cage air-gap. Despite success of such cover channels, they suffer high risk being detected transmitter computer challenge installing malware into a computer. In this paper, we propose MagView, distributed channel, where sensitive information is embedded in other as video...

10.1109/infocom41043.2020.9155386 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2020-07-01

Ransomware is a kind of computer malware that has spread widely in recent years, such as DarkSide, which around the world recently. It's reported DarkSide extorted ${\$}$ 90 million nine months. It extorts ransom from users by encrypting user files and other methods, causing huge economic losses to users, including commercial organizations individuals. Existing ransomware detection methods include hostbased network-based methods. However, these are either hard deploy or have possibility be...

10.1109/icpads56603.2022.00061 article EN 2023-01-01

Nowadays, most Internet of Things devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks such as spoofing and eavesdropping attacks. Existing methods using encryption keys may be inapplicable these resource-constrained that cannot afford the computationally expensive operations. Thus, this article, we design a key-free communication method home. In particular, introduce Home-limited Channel (HLC) can accessed only within house yet...

10.1145/3399432 article EN ACM Transactions on Internet of Things 2020-08-04

Nowadays most IoT devices in smart homes rely on radio frequency channels for communication, making them exposed to various attacks. Existing methods using encryption keys may be inapplicable these resource-constrained that cannot afford the computationally expensive operations. Thus, this paper we design a key-free communication method such devices. In particular, introduce Home-limited Channel (HLC) can accessed only within house yet inaccessible an outside-house attacker. Utilizing HLCs,...

10.1145/3196494.3196499 article EN 2018-05-29

Trade secrets such as intellectual properties are the inherent values for firms. Although companies have exploited strict access management policies and isolated their networks from public Internet, trade still vulnerable to side-channel attacks. Side-channels can reveal computing processes of computers in forms various physical signals light, electromagnetism, even heat. Such side-channels bypass isolation mechanism therefore bring about severe threats. However, existing only perform well...

10.1145/3448300.3468291 article EN 2021-06-24

Air-gapped networks achieve security by using physical isolation to keep the computers and network from Internet. However, magnetic covert channels based on CPU utilization have been proposed help secret data exfiltrate Faraday-cage air gap. Despite success of such channels, they suffer high risk being detected transmitter computer challenge installing malware into a computer. In this article, we propose <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tmc.2023.3262400 article EN IEEE Transactions on Mobile Computing 2023-03-28

Recent studies have exposed that voice assistants can be manipulated by various commands without being noticed, however, existing attacks require a nearby speaker to play the attack commands. In this paper, we demonstrate even speaker, use capacitors inside electronic devices produce malicious commands, i.e., convert into speakers and call it <monospace xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CapSpeaker</monospace> . The underlying principle...

10.1109/tdsc.2023.3326184 article EN IEEE Transactions on Dependable and Secure Computing 2023-10-20

With the widespread use of smart devices, device authentication has received much attention. One popular method for is to utilize internally measured fingerprints, such as ID, software or hardware-based characteristics. In this article, we propose DeMiCPU , a stimulation-response-based fingerprinting technique that relies on externally information, i.e., magnetic induction (MI) signals emitted from CPU module consists chip and its affiliated power-supply circuits. The key insight hardware...

10.1145/3495158 article EN ACM Transactions on Sensor Networks 2021-12-21
Coming Soon ...