Xiaokuan Zhang

ORCID: 0000-0002-4646-7146
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Security and Verification in Computing
  • Internet Traffic Analysis and Secure E-voting
  • Extracellular vesicles in disease
  • Blockchain Technology Applications and Security
  • Metal-Organic Frameworks: Synthesis and Applications
  • User Authentication and Security Systems
  • Microwave Engineering and Waveguides
  • Adversarial Robustness in Machine Learning
  • Advanced Nanomaterials in Catalysis
  • Cancer Immunotherapy and Biomarkers
  • Privacy, Security, and Data Protection
  • Cryptographic Implementations and Security
  • Network Security and Intrusion Detection
  • Antenna Design and Analysis
  • Carbon and Quantum Dots Applications
  • Mercury impact and mitigation studies
  • Prostate Cancer Treatment and Research
  • Analytical chemistry methods development
  • Adsorption and biosorption for pollutant removal
  • Cloud Data Security Solutions
  • RFID technology advancements
  • Distributed systems and fault tolerance
  • Energy Harvesting in Wireless Networks

Hebei Medical University
2022-2025

Fourth Hospital of Hebei Medical University
2022-2025

George Mason University
2022-2024

Nanjing Tech University
2022-2024

Georgia Institute of Technology
2021-2023

Air Force Engineering University
2017-2023

The Ohio State University
2016-2022

Microsoft (United States)
2020

University of North Carolina at Chapel Hill
2019

Tsinghua University
2018

Intel Software Guard Extension (SGX) protects the confidentiality and integrity of an unprivileged program running inside a secure enclave from privileged attacker who has full control entire operating system (OS). Program execution this is therefore referred to as shielded. Unfortunately, shielded does not protect programs side-channel attacks by attacker. For instance, it been shown that changing page table entries memory pages used execution, malicious OS kernel could observe accesses...

10.1145/3052973.3053007 article EN Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security 2017-03-31

Smart home is an emerging technology for intelligently connecting a large variety of smart sensors and devices to facilitate automation appliances, lighting, heating cooling systems, security safety systems. Our research revolves around Samsung SmartThings, platform with the largest number apps among currently available platforms. The previous has revealed several flaws in design which allow malicious (or SmartApps) possess more privileges than they were designed eavesdrop or spoof events...

10.1145/3243734.3243820 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2018-10-15

Cache side-channel attacks have been extensively studied on x86 architectures, but much less so ARM processors. The technical challenges to conduct ARM, presumably, stem from the poorly documented cache implementations, such as coherence protocols and flush operations, also lack of understanding how different implementations will affect attacks. This paper presents a systematic exploration vectors for flush-reload are among most well-known x86. It has shown in previous work that they capable...

10.1145/2976749.2978360 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Combining nanomedicine with immunotherapy offers a promising and potent cancer treatment strategy; however, improving the effectiveness of antitumor immune response remains challenging. A "cold" tumor microenvironment (TME) is marked factor affecting efficacy immunotherapy. Herein, intracellular-acidity-activatable dynamic nanoparticles (NPs) were designed for precision photodynamic ferroptosis in cancer. M1 macrophage-derived exosomes (Mex) constructed to coassemble photosensitizer SR780,...

10.34133/bmr.0153 article EN cc-by Biomaterials Research 2025-02-06

Machine learning empowers traffic-analysis attacks that breach users' privacy from their encrypted traffic.Recent advances in deep drastically escalate such threats.One prominent example demonstrated recently is a attack against video streaming by using convolutional neural networks.In this paper, we explore the adaption of techniques previously used domains adversarial machine and differential to mitigate machine-learning-powered analysis traffic.Our findings are twofold.First, constructing...

10.14722/ndss.2019.23210 article EN 2019-01-01

Today, there is an increasing number of smartphones supporting wireless charging that leverages electromagnetic induction to transmit power from a charger the smartphone. In this paper, we report new contactless and context-aware wireless-charging side-channel attack, which captures two physical phenomena (i.e., coil whine magnetic field perturbation) generated during process further infers user interactions on We design implement three-stage attack framework, dubbed WISERS, demonstrate...

10.1109/sp46215.2023.10179322 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2023-05-01

Recently, power banks for smartphones have begun to support wireless charging. Although these charging appear be immune most reported vulnerabilities in either or charging, we found a new contactless side channel that leaks user privacy from their without compromising victim smartphones. We proposed BankSnoop demonstrate the practicality of newly discovered banks. Specifically, it leverages coil whine and magnetic field disturbance emitted by bank when wirelessly smartphone adopts few-shot...

10.1145/3570361.3613288 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2023-09-30

Recently, in-display fingerprint sensors have been widely adopted in newly-released smartphones. However, we find this new technique can leak information about the user's fingerprints during a screen-unlocking process via electromagnetic (EM) side channel that be exploited for recovery. We propose FPLogger to demonstrate feasibility of novel side-channel attack. Specifically, it leverages emitted EM emanations when user presses sensor extract information, then maps captured signals images...

10.1145/3576915.3623153 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

It has been demonstrated in numerous previous studies that Android and its underlying Linux operating systems do not properly isolate mobile apps to prevent cross-app sidechannel attacks.Cross-app information leakage enables malicious infer sensitive user data (e.g., passwords), or private identity location) without requiring specific permissions.Nevertheless, no prior work ever studied these side-channel attacks on iOS-based devices.One reason is iOS does implement procfsthe most popular...

10.14722/ndss.2018.23260 article EN 2018-01-01

Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and paste text within the same app or across different apps. However, insufficient access control on operating systems exposes its contained data high risks where one can read copied other store it locally even send remote servers. Unfortunately, literature only ad-hoc studies this respect lacks a comprehensive systematic study of entire ecosystem. To establish missing links, paper proposes an automated...

10.1145/3597503.3623317 article EN 2024-02-06

Public cloud platforms have employed Trusted Execution Environment (TEE) technology to provide confidential computing services. However, applications running on TEEs are susceptible rollback or forking attacks. Their states can be rolled back an outdated version split into multiple conflicting versions, violating state continuity. Existing solutions against these attacks either rely centralized trust assumption ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/tdsc.2024.3381973 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-01

Online Social Networks (OSNs) are facing an increasing threat of sybil attacks. Sybil detection is regarded as one major challenges for OSN security. The existing proposals that leverage graph theory or exploit the unique clickstream patterns either based on unrealistic assumptions limited to service providers. In this study, we introduce a novel approach by exploiting fundamental mobility separate real users from ones. proposed motivated follows. On hand, OSNs including Yelp and Dianping...

10.1109/glocom.2014.7036889 article EN 2014-12-01

Public cloud platforms have leveraged Trusted Execution Environment (TEE) technology to provide confidential computing services. However, TEE-protected applications still suffer from rollback or forking attacks, in which their states could be rolled back a stale version forked into multiple versions, resulting state continuity violations. Existing solutions against these attacks either rely on weak threat models based centralized trust (e.g., trusted server) large performance overheads tens...

10.1145/3548606.3560620 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

Knowledge work increasingly spans multiple computing surfaces. Yet in status quo user experiences, content as well tools, behaviors, and workflows are largely bound to the current device-running application, for user, at moment time. SurfaceFleet is a system toolkit that uses resilient distributed programming techniques explore cross-device interactions unbounded these four dimensions of device, As reference implementation, we describe an interface built using employs lightweight,...

10.1145/3379337.3415874 article EN 2020-10-16

Along with gaining popularity of Real-Time Bidding (RTB) based programmatic advertising, the click farm invalid traffic, which leverages massive real smartphones to carry out large-scale ad fraud campaigns, is becoming one major threats against online advertisement. In this study, we take an initial step towards detection and measurement traffic. Our study begins a on device's features using real-world labeled dataset, reveals series distinguishing fraudulent devices from benign ones. Based...

10.1145/3460120.3484547 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2021-11-12

Text passwords remain a primary means for user authentication on modern computer systems. However, recent studies have shown the promises of guessing efficiently with auxiliary information targeted accounts, such as users' personal information, previously used passwords, or those in other Authentication rate-limiting mechanisms, account lockout and login throttling, are common methods to defeat online password cracking attacks. But date, no published investigated how is implemented by...

10.1145/3274694.3274714 article EN 2018-12-03
Coming Soon ...