Cross-device profiled side-channel attacks using meta-transfer learning H Yu, H Shan, M Panoff, Y Jin 2021 58th ACM/IEEE Design Automation Conference (DAC), 703-708, 2021 | 37 | 2021 |
Invisible finger: Practical electromagnetic interference attack on touchscreen-based electronic devices H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin 2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022 | 34 | 2022 |
Inside Radio: An Attack and Defense Guide Q Yang, L Huang Springer, 2018 | 26 | 2018 |
A review and comparison of AI-enhanced side channel analysis M Panoff, H Yu, H Shan, Y Jin ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022 | 23 | 2022 |
PDNPulse: Sensing PCB anomaly with the intrinsic power delivery network H Zhu, H Shan, D Sullivan, X Guo, Y Jin, X Zhang IEEE Transactions on Information Forensics and Security 18, 3590-3605, 2023 | 16 | 2023 |
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback Y Zheng, L Huang, H Shan, J Li, Q Yang, W Xu 2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017 | 11 | 2017 |
Trrscope: Understanding target row refresh mechanism for modern ddr protection Y Jiang, H Zhu, H Shan, X Guo, X Zhang, Y Jin 2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021 | 10 | 2021 |
Lahel: Lightweight attestation hardening embedded devices using macrocells O Arias, D Sullivan, H Shan, Y Jin 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 10 | 2020 |
LTE redirection: Forcing targeted LTE cellphone into unsafe network W Zhang, H Shan Proc. Defcon, 2016 | 10 | 2016 |
Crowbar: Natively fuzzing trusted applications using arm coresight H Shan, M Huang, Y Liu, S Nissankararao, Y Jin, S Wang, D Sullivan Journal of Hardware and Systems Security 7 (2), 44-54, 2023 | 6 | 2023 |
Protecting platoons from stealthy jamming attack Y Hu, H Shan, RG Dutta, Y Jin 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2020 | 6 | 2020 |
Man in the NFC H Shan, J Yuan Code Blue, 1-30, 2017 | 5 | 2017 |
Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin 2023 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2023 | 4 | 2023 |
SaeCAS: secure authenticated execution using CAM-based vector storage O Arias, D Sullivan, H Shan, Y Jin IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020 | 4 | 2020 |
LightEMU: Hardware Assisted Fuzzing of Trusted Applications H Shan, S Nissankararao, Y Liu, M Huang, S Wang, Y Jin, D Sullivan IEEE International Symposium on Hardware Oriented Security and Trust, 2024 | 3 | 2024 |
Noise2Clean: cross-device side-channel traces denoising with unsupervised deep learning H Yu, M Wang, X Song, H Shan, H Qiu, J Wang, K Yang Electronics 12 (4), 1054, 2023 | 3 | 2023 |
GAZEploit: Remote Keystroke Inference Attack by Gaze Estimation from Avatar Views in VR/MR Devices H Wang, Z Zhan, H Shan, S Dai, M Panoff, S Wang Proceedings of the 2024 on ACM SIGSAC Conference on Computer and …, 2024 | 2 | 2024 |
{VoltSchemer}: Use Voltage Noise to Manipulate Your Wireless Charger Z Zhan, Y Yang, H Shan, H Wang, Y Jin, S Wang 33rd USENIX Security Symposium (USENIX Security 24), 3979-3995, 2024 | 2 | 2024 |
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers Y Zheng, H Shan HITB 2016 Amsterdam, 23, 2016 | 2 | 2016 |
Build a cellular traffic sniffier with femoto cell Y Zheng, H Shan | 2 | |