What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Zihao Zhan
Google Scholar
9
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/host
FanBleed: Stealing Your Secrets via Observing Your Cooling Fan.
Sisheng Liang
Zhengxiong Li
Zihao Zhan
Zhenkai Zhang
2024
conf/ccs
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices.
Hanqiu Wang
Zihao Zhan
Haoqi Shan
Siqi Dai
Maximillian Panoff
Shuo Wang
2024
conf/uss
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger.
Zihao Zhan
Yirui Yang
Haoqi Shan
Hanqiu Wang
Yier Jin
Shuo Wang
2022
conf/sp
Clairvoyance: Exploiting Far-field EM Emanations of GPU to "See" Your DNN Models through Obstacles at a Distance.
Sisheng Liang
Zihao Zhan
Fan Yao
Long Cheng
Zhenkai Zhang
2022
conf/sp
Invisible Finger: Practical Electromagnetic Interference Attack on Touchscreen-based Electronic Devices.
Haoqi Shan
Boyi Zhang
Zihao Zhan
Dean Sullivan
Shuo Wang
Yier Jin
2022
conf/sp
Graphics Peeping Unit: Exploiting EM Side-Channel Information of GPUs to Eavesdrop on Your Neighbors.
Zihao Zhan
Zhenkai Zhang
Sisheng Liang
Fan Yao
Xenofon D. Koutsoukos
2020
conf/sp
Leveraging EM Side-Channel Information to Detect Rowhammer Attacks.
Zhenkai Zhang
Zihao Zhan
Daniel Balasubramanian
Bo Li
Péter Völgyesi
Xenofon D. Koutsoukos
2020
conf/host
BitJabber: The World's Fastest Electromagnetic Covert Channel.
Zihao Zhan
Zhenkai Zhang
Xenofon D. Koutsoukos
2018
conf/ccs
Triggering Rowhammer Hardware Faults on ARM: A Revisit.
Zhenkai Zhang
Zihao Zhan
Daniel Balasubramanian
Xenofon D. Koutsoukos
Gabor Karsai
Coauthors
Bo Li
(1)
Boyi Zhang
(1)
Daniel Balasubramanian
(2)
Dean Sullivan
(1)
Fan Yao
(2)
Gabor Karsai
(1)
Hanqiu Wang
(2)
Haoqi Shan
(3)
Long Cheng
(1)
Maximillian Panoff
(1)
Péter Völgyesi
(1)
Shuo Wang
(3)
Siqi Dai
(1)
Sisheng Liang
(3)
Xenofon D. Koutsoukos
(4)
Yier Jin
(2)
Yirui Yang
(1)
Zhengxiong Li
(1)
Zhenkai Zhang
(6)
Zihao Zhan
(9)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to