Cross-device profiled side-channel attacks using meta-transfer learning H Yu, H Shan, M Panoff, Y Jin 2021 58th ACM/IEEE Design Automation Conference (DAC), 703-708, 2021 | 27 | 2021 |
Inside Radio: An Attack and Defense Guide Q Yang, L Huang Springer, 2018 | 25 | 2018 |
Invisible finger: Practical electromagnetic interference attack on touchscreen-based electronic devices H Shan, B Zhang, Z Zhan, D Sullivan, S Wang, Y Jin 2022 IEEE Symposium on Security and Privacy (SP), 1246-1262, 2022 | 19 | 2022 |
A review and comparison of ai-enhanced side channel analysis M Panoff, H Yu, H Shan, Y Jin ACM Journal on Emerging Technologies in Computing Systems (JETC) 18 (3), 1-20, 2022 | 18 | 2022 |
PDNPulse: Sensing PCB anomaly with the intrinsic power delivery network H Zhu, H Shan, D Sullivan, X Guo, Y Jin, X Zhang IEEE Transactions on Information Forensics and Security, 2023 | 10 | 2023 |
Ghost telephonist impersonates you: Vulnerability in 4G LTE CS fallback Y Zheng, L Huang, H Shan, J Li, Q Yang, W Xu 2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017 | 10 | 2017 |
LTE redirection: Forcing targeted LTE cellphone into unsafe network W Zhang, H Shan Proc. Defcon, 2016 | 9 | 2016 |
Trrscope: Understanding target row refresh mechanism for modern ddr protection Y Jiang, H Zhu, H Shan, X Guo, X Zhang, Y Jin 2021 IEEE International Symposium on Hardware Oriented Security and Trust …, 2021 | 7 | 2021 |
LAHEL: Lightweight attestation hardening embedded devices using macrocells O Arias, D Sullivan, H Shan, Y Jin 2020 IEEE International Symposium on Hardware Oriented Security and Trust …, 2020 | 6 | 2020 |
Protecting platoons from stealthy jamming attack Y Hu, H Shan, RG Dutta, Y Jin 2020 Asian Hardware Oriented Security and Trust Symposium (AsianHOST), 1-6, 2020 | 4 | 2020 |
SaeCAS: secure authenticated execution using CAM-based vector storage O Arias, D Sullivan, H Shan, Y Jin IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2020 | 4 | 2020 |
Man in the NFC H Shan, J Yuan Code Blue, 1-30, 2017 | 4 | 2017 |
CROWBAR: Natively Fuzzing Trusted Applications Using ARM CoreSight H Shan, M Huang, Y Liu, S Nissankararao, Y Jin, S Wang, D Sullivan Journal of Hardware and Systems Security 7 (2), 44-54, 2023 | 2 | 2023 |
Dual-leak: Deep unsupervised active learning for cross-device profiled side-channel leakage analysis H Yu, S Wang, H Shan, M Panoff, M Lee, K Yang, Y Jin 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 2 | 2023 |
Noise2clean: cross-device side-channel traces denoising with unsupervised deep learning H Yu, M Wang, X Song, H Shan, H Qiu, J Wang, K Yang Electronics 12 (4), 1054, 2023 | 2 | 2023 |
Time is On My Side: Forging a Wireless Time Signal to Attack NTP Servers Y Zheng, H Shan HITB 2016 Amsterdam, 23, 2016 | 2 | 2016 |
Build a cellular traffic sniffier with femoto cell Y Zheng, H Shan | 2 | |
LightEMU: Hardware Assisted Fuzzing of Trusted Applications H Shan, S Nissankararao, Y Liu, M Huang, S Wang, Y Jin, D Sullivan IEEE International Symposium on Hardware Oriented Security and Trust, 2024 | 1 | 2024 |
VoltSchemer: Use Voltage Noise to Manipulate Your Wireless Charger Z Zhan, Y Yang, H Shan, H Wang, Y Jin, S Wang arXiv preprint arXiv:2402.11423, 2024 | | 2024 |
HeisenTrojans: They Are Not There Until They Are Triggered AR Mavurapu, H Shan, X Guo, O Arias, D Sullivan Asian Hardware Oriented Security and Trust Symposium, 2023 | | 2023 |