欢迎来到张帆的中文主页

信息与电子工程学院
浙江大学
我的主页 相关新闻 发表论著 科研活动 教学活动 相关信息 我的学生 中文 英文
代表性论文
所有论文
其他著作








    相关链接:
安全架构和前沿电子实验室
(在建,仅限校内访问)
信息与电子工程学院
网络空间安全研究中心






 
SCI期刊论文
  1. F. Zhang, B. Yang, X. Dong, S. Guilley, Z. Liu*, W. He, F. G. Zhang, K. Ren, "Side-Channel Analysis and Countermeasure Design on ARM-based Quantum-Resistant SIKE," IEEE Transactions on Computers, accepted  (CCF-A).
  2. C. Ou, S. Lam, C. Zhou, G. Jiang, F. Zhang*, "A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks," IEEE Transactions on Computers, accepted  (CCF-A).
  3. F. Zhang, X. Dong, B. Yang, Y. Zhou*, K. Ren, "A Systematic Evaluation of Wavelet-based Attack Framework on Random Delay Countermeasures," IEEE Transactions on Information Forensics & Security, Vol.15, pp.1407-1422, 2020. [PDF]  (CCF-A).
  4. F. Zhang*, G Xu, B. Yang, Z. Liang, K. Ren, "Theoretical Analysis of Persistent Fault Attack,"  SCIENCE CHINA Information Sciences, 2020, 63(3):139102. [PDF]
  5. F. Zhang, Y. Zhang, H. Jiang, X. Zhu, F. Lin*, K. Ren, "Precise Methods for Distinguishing S-box Faults in Laser Injection Attacks," IET Electronics Letters, Vol.55, No.25, pp.1333-1335, December 2019.  [PDF] (ZJUTOP).
  6. Z. Liu, Y. Cao*, X. Zhang, C. Zhu, F. Zhang, "Managing recurrent virtual network updates in multi-tenant datacenters: A system perspective," IEEE Transactions on Parellel and Distributed Systems, Vol.30, No.8, pp.1816-1825, August 2019. [PDF]  (CCF-A).
  7. J. T. Ning, J. Xu*, K. T. Liang, F. Zhang, E. -C. Chang, "Passive Attacks Against Searchable Encryption," IEEE Transactions on Information Forensics & Security, Vol.13, No.3, pp.789-802, March 2019. [PDF]  (CCF-A).
  8. L. Dong, H. Zhang*, L. Zhu, S. Sun, H. Gan, F. Zhang*, "Analysis of an Optimal Fault Attack on an LED Lightweight Cryptosystem," IEEE Access, Vol.7, pp.31656-31662, 2019. [PDF]
  9. F. Zhang*, Z. Liang, B. Yang, X. Zhao, S. Guo, K. Ren, "Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition," Frontiers of Information Technology & Electronic Engineering., Vol.19, No.12, pp.1475-1499, 2018. [PDF]
  10. C. Xu, J. Shen*, X. Du, F. Zhang, "An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units," IEEE Access, Vol.6, pp.48697-48707, 2018. [PDF]
  11. Y. K. Tang*, S. Q. Li, F. Zhang, L. Fang, "Thermal maps based HT detection using spatial projection transformation," IET Information Security, Vol.12, Issue.4, pp.356–361, 2018. [PDF]
  12. P. Zhou, T. Wang, X. Lou, X. Zhao, F. Zhang*, S. Guo, "Efficient flush-reload cache attack on scalar multiplication based signature algorithm," SCIENCE CHINA Information Sciences, 2018, 61:039102. [PDF]
  13. X. Zhao, F. Zhang*, S. Guo, Z. Gong, "Optimal Model Search for Hardware-Trojan-based Bit-level Fault Attacks on Block Ciphers," SCIENCE CHINA Information Sciences, 2018, 61(3):039106. [PDF]
  14. J. Shen*, L. Geng, F. Zhang, "Dynamic current logic based flip-flop design for robust and low power security ICs," Electronics Letters, Vol.53, No.18, pp.1236-1238, 2017. [PDF] (ZJU TOP)
  15. H. Chen, T. Wang, F. Zhang*, X. Zhao, W. He, L. Xu, Y. Ma, "Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher," Security and Communication Networks., Vol.2017, ArticleID 8051728, 2017. [PDF]
  16. F. Zhang, X. Zhao, W. He*, S. Bhasin, S. Guo, "Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers," SCIENCE CHINA Information Sciences, 2017, 60:048102. [PDF]
  17. H. Gan, H. Zhang*, M. Khan, X. Wang, F. Zhang, P. He, "An improved empirical mode decomposition for power analysis attack," China Communications, Vol.14, No.9, pp.94-99, 2017. [PDF]
  18. M. Khan, H. Zhang*, F. Zhang, S. Shahzad, R. Ullah, S. Ali, Q. Arain, M. Ahmed, "X-Band Power Amplifier for Next Generation Networks based on MESFET," China Communications, Vol.14, No.4, pp.11-19, 2017. [PDF]
  19. H. Chen, T. Wang, S. Guo, X. Zhao, F. Zhang*, J. Liu, "Improved Differential Fault analysis of SOSEMANUK with Algebraic Techniques," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences., Vol.E100-A, No.3, pp.811-821, 2017. [PDF]
  20. F. Zhang*, S. Guo, X. Zhao, T. Wang, J. Yang, F. -X. Standaert, D. Gu "A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," IEEE Transactions on Information Forensics & Security, Vol.11, No.5, pp.1039-1054, 2016.  (CCF-A, IF=4.332[PDF]
  21. F. Zhang, X. Zhao, S. Guo, J. Shen*, J. Huang, Z. Hu, "A Comprehensive Study of Algebraic Fault Analysis on PRINCE," China Communications, Vol.12, No.7, pp.127-141, 2015. [PDF]
  22. P. Zhou, T. Wang, G. Li, F. Zhang*, X. Zhao, "Analysis on the Parameter Selection Method for FLUSH+RELOAD based Cache Timing Attack on RSA," China Communications, Vol.12, No.6, pp.33-45, 2015. [PDF]
  23. S. Guo, X. Zhao, F. Zhang*, T. Wang, Z. Shi, F. -X Standaert, "Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations," IEEE Transactions on Information Forensics & Security, Vol.9, No.6, pp.999-1014, 2014. (CCF-A, IF=4.332[PDF]
  24. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, Z. Liu, J. Gallais, "A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES," Computers & Security, Vol.39: 173-189, 2013. [PDF]
  25. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, H. Liu, K, Ji, J. Huang. "Efficient Hamming Weight based Side-Channel Cube Attacks on PRESENT," The Journal of Systems and Software, Vol. 86, Issue 3, pp. 728-743, 2013. [PDF]
  26. X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, and H. Luo, "Enhanced Side-Channel Cube Attacks on PRESENT," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E96-A, No. 1, pp. 332-339, 2013. [PDF]

会议论文
  1. Y. Chen, B. Xuan, C. Poskitt, J. Sun, F. Zhang*, "Active Fuzzing for Testing and Securing Cyber-Physical Systems," The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2020.  accepted   (CCF-A).
  2. F. Zhang, B. Shao, G. Xu, B. Yang, Z. Yang*, Z. Qin, K. Ren, "From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis on Cross Devices," Design Automation Conference (DAC), 2020.  accepted   (AR=23%, CCF-A).
  3. W. Liu, C. -H. Chang*, F. Zhang*, X. Lou, "Imperceptible Misclassification Attack on Deep Learning Accelerator by Glitch Injection," Design Automation Conference (DAC), 2020.  accepted   (AR=23%, CCF-A).
  4. F. Zhang, Y. Zhang, H. Jiang, X. Zhu, S. Bhasin, Z. Liu*, D. Gu, K. Ren, "Persistent Fault Attack in Practice," IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, No.2, pp.172-195, 2020. (AR=23%, CCF-B).
  5. P. Chin, Y. Cao, L. Zhang, X. Zhao, F. Zhang*, "Locking Secret Data in the Vault Leveraging Fuzzy PUFs," In AsianHOST 2019, December 2019. accepted   (Best Paper Candidate).
  6. F. Zhang, B. -L Yang, B. -J Yang*, Y. Zhang, S. Bhasin, K. Ren, "Fluctuating Power Logic: SCA protection by VDD randomization at the cell-level," In AsianHOST 2019, December 2019. accepted.
  7. X. Lou, F. Zhang*, G. Xu, Z. Liang, X. Zhao, S. Guo, K. Ren, "Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance," In Inscrypt 2019, December 2019. accepted. (AR=24.5%, 23/94)
  8. Y. Zhang, F. Zhang*, B, Yang, G. Xu, B. Shao, X. Zhao, K. Ren, "Persistent Fault Injection in FPGA via BRAM Modification," In The 2019 IEEE Conference on Dependable and Secure Computing (IDSC 2019), November 2019. accepted.
  9. X. Cai, J. Yi, F. Zhang, S. Rajasekaran*, "Adversarial Structured Neural Network Pruning," In CIKM 2019, pp. 2433-2436, November 2019. (CCF-B, AR=21%, 100/470)
  10. Y. Chen, C. Poskitt, J. Sun, S. Adepu, F. Zhang*, "Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences," In 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp.962-973, 2019, San Diego, CA, USA.  [PDF] (CCF-A, AR=21%, 93/455)
  11. W. Guo, Y. Cao, C. -H. Chang, M. Zhu, W. Ge, F. Zhang, "A Reliable Physical Unclonable Function Based on Differential Charging Capacitors," In ISCAS 2019, May 2019. accepted.
  12. J. Pan, F. Zhang, K. Ren, S. Bhasin, "One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis," In DATE 2019, pp. 1-6, March 2019.  [PDF] (CCF-B, AR=24%, 202/834).
  13. S. Bhasin, J. Pan, F. Zhang, "Persistence Wears Down Resistance: Persistent Fault Analysis on Unprotected and Protected Block Cipher Implementations (Extended Abstract)," In SPACE 2018, December 2018.  [PDF]  [Slides] (Invited paper)
  14. X. Dong, F. Zhang*, S. Queshi, Y. Zhang, Z. Liang, F. Gao, "A Wavelet-based Power Analysis Attack against Random Delay Countermeasure," In AsianHOST 2018, pp.19-24, December 2018.  [PDF]
  15. F. Zhang, X. Dong, Y. Zhang, X. Lou, Y. Wang, S. Qureshi, X. Zhao, Y. Tang "Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques," In MASS 2018, pp.335-343, October 2018.
  16. F. Zhang*, X. Lou, X. Zhao, S. Bhasin, W. He, R. Ding, S. Qureshi, K. Ren, "Persistent Fault Analysis on Block Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, pp.150-172, 2018. [PDF] [Video] [PPT] (CCF-B, the same paper won Best Paper Award in ChinaCrypt 2018).
  17. X. Cai, S. Rajasekaran*, F. Zhang, "Efficient Approximate Algorithms for the Closest Pair Problem in High Dimensional Spaces," In PAKDD 2018, pp.151-163, June 2018. [PDF]
  18. F. Zhang*, L. Geng, J. Shen, S. Bhasin, X. Zhao, S. Guo, "Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks," In AsianHOST 2017, pp.49-54, 2017. [PDF]
  19. X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, M. Chu, D. Gu, "Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering," In FTDC 2014, pp.29-39, 2014. [PDF]
  20. F. Zhang, X. Zhao, S. Guo, T. Wang, and Z. Shi, "Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers," In COSADE 2013, LNCS, vol. 7864, pp. 62-79, March 7-8, 2013. [PDF]
  21. X. Zhao, S. Guo, F. Zhang, Z. Shi, T. Wang, "Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques," In FDTC 2013, pp. 41-51, August, 2013. [PDF]
  22. X. Zhao, F. Zhang, T. Wang, S. Guo, Z. Shi, H. Liu, K. Ji. "MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation," In COSADE 2012, LNCS, vol. 7275, pp. 231-248, 2012.  [PDF] (Best Paper Award)
  23. F. Zhang, Z. Shi, "Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool," In ITNG 2011, pp. 359-365, April 2011. [PDF]
  24. S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, "Making Register File Resistant to Power Analysis Attacks," In ICCD 2008, pp. 577-582, October 2008. [PDF]
  25. F. Zhang, Z. Shi, "An Efficient Window-based Countermeasure to Power Analysis of ECC Algorithms," In ITNG 2008, pp. 120-126, April 2008.[PDF]
  26. F. Zhang, Z. Shi, B. Wang, "Chord-based Key Establishment Schemes for Sensor Networks," In ITNG 2008, pp. 731-737, April 2008. [PDF]
  27. F. Zhang, Z. Shi, "Power Analysis Attacks on ECC Randomized Automata," In ITNG 2007, pp. 900-901, April 2007. [PDF] 
  28. Z. Shi, F. Zhang, "New Attacks on Randomized ECC Algorithms," In EITC 2006, pp. 22-25, August 2006. [PDF]

EI期刊论文
  1. P. Zhou, T. Wang, X. Zhao, F. Zhang*, "Flush-Reload Cache timing attack on SM2 digital signature algorithm," Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol.46, No.3, pp.24-29, 2018. In Chinese.
  2. Y. Ma, T. Wang*, H. Chen, F. Zhang, X. Lou, L. Xu, W. Yang, "Fault Cube Attack on SIMON Family of Lightweight Block Ciphers," Journal of Zhejiang University (Engineering Science), Vol.51, No.9, pp.1770-1779, 2017. In Chinese.
  3. H. Chen*, T. Wang, F. Zhang, X. Zhao, "Fault-based guess-and-determine attack on SOSEMANUK," Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol.45, No.2, pp.72-77, 2017. In Chinese.
  4. J. Huang, X. Zhao*, F. Zhang, S. Guo, P. Zhou, J. Yang, "Improvement and Evaluation for Algebraic Fault Attacks on PRESENT," Journal on Communications, Vol.37, No.8, pp.144-156, 2016. In Chinese.
  5. H. Gan*, H. Zhang, J. Li, F. Zhang, X. Zhao, P. He, "Independent component analysis applied in electromagnetic attack," Chinese Journal of Radio Science, Vol.31, No.2, pp.401-405, 2016. In Chinese.
  6. H. Gan, H. Zhang, F. Zhang*, X. Zhao, P. He, "Electromagnetic Information Leakage Acquisition and Pretreatment," Chinese Journal of Radio Science, Vol.30, No.5, pp.1004-1008, 2015. In Chinese.
  7. H. Zhang, J. Li, F. Zhang*, H. Gan, P. He, "A Study on Template Attack of Chip Base on Side Channel Power Leakage," Chinese Journal of Radio Science, Vol.30, No.5, pp.987-992, 2015. In Chinese.
  8. H. Chen*, T. Wang, F. Zhang, X. Zhao, Y. Sun, "Algebraic Fault Analysis on HIGHT," Journal of Shanghai Jiaotong University, Vol.49, No.12, pp.1817-1825, 2015. In Chinese.
  9. X. Wang, S. Guo, X. Zhao, M. Song, F. Zhang, "Research of power preprocessing optimization-based template attack on LED," Journal on Communications, Vol.35, No.3, pp.157-167, 2014. In Chinese.
  10. X. Zhao, S. Guo, T. Wang, F. Zhang, H. Liu, J. Huang, P. Wang, "Research of Algebraic Fault Analysis on Piccolo," Chinese Journal of Computers, Vol.36, No.4, pp.882-894, 2013. In Chinese.
  11. H. Liu, X. Zhao, T. Wang, S. Guo, F. Zhang, J. Ke, "Research of Hamming Weight-Based Algebraic Side-Channel Attacks on SMS4," Chinese Journal of Computers, Vol.36, No.6, pp.1183-1193, 2013. In Chinese.
  12. X. Zhao, S. Guo, T. Wang*, F. Zhang, Z. Shi, "Fault-Propagate Pattern based DFA on PRESENT and PRINTcipher," Wuhan University Journal of Natural Sciences. Vol. 17, No. 6, pp. 485-493, 2012.[PDF]
  13. T. Wang, X. Zhao, S. Guo, F. Zhang, H. Liu, and T. Zheng, "Research of Cache Timing Template Attacks on AES," (in Chinese) Chinese Journal of Computers. Vol. 2, No. 1, pp. 325-341, February 2012.
  14. F. Zhang, S. Zhang, Y. Tang, W. Dai, "Design on Smart card-based Secure Logon System," Information Security and Communications Privacy, 2004(3):38-41. In Chinese.

专著的部分章节
  1. F. Zhang, B. Shao, W. Gu, "Artificial Intelligence with Side Channle Analysis," (人工智能之于旁路分析) in Communications of the CCF, Vol.15, Issue.7, Editors: K. Ren, (Eds.), July 2019.[PDF]
  2. F. Zhang, B. Yang, G. Xu, X. Lou, S. Bhasin, K. Ren, "Improvements and recent updates of persistent fault analysis on block ciphers," in Book Frontiers in Hardware Security and Trust, Editors: Chang Chip-Hong, Cao Yuan, (Eds.) 2019.
  3. F. Zhang, B. Yang, S. Guo, X. Zhao, T. Wang, F. -X. Standaert, D. Gu, "An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," in Book Automated Methods in Cryptographic Fault Analysis, Editors: Breier, Jakub, Hou, Xiaolu, Bhasin, Shivam (Eds.) 2018.
  4. Y. Yao, F. Zhang, and Y. Fu, "Realtime Hand-Gesture Recognition Using RGB-D Sensor," in Book Computer Vision and Machine Learning with RGB-D Sensors, pp.289-313, 2014.
  5. Z. Shi, B. Wang, F. Zhang, "CBKE: Chord-based Key Establishment Schemes for Wireless Sensor Networks," Chapter in Handbook on Sensor Networks, (Xiao, Chen and Li, eds.), pp. 399-418, World Scientific Publishing Company, August 2010.[PDF]

其他论文
  1. A. Wang*, J. Ge, N. Shang, F. Zhang, G Zhang, "Practical Cases of Side-channel Analysis," Journal of Cryptologic Research, Vol.5, Issue.4, pp.383-398, 2018. In Chinese.
  2. X. Lou, F. Zhang*, J. Huang, X. Zhao, H. Liu, "Research on Trace Driven Cache Analysis on SM4," Journal of Cryptologic Research, Vol.5, Issue.4, pp.430-441, 2018. In Chinese.
  3. H. Chen*, T. Wang, X. Zhao, F. Zhang, Y. Ma, X. Wang, "Research of fault-tolerant algebraic fault attack on HIGHT," Journal of Nanjing University(Natural Science), Vol.53, No.6, pp.1141-1152, 2017. In Chinese.
  4. Y. Wang, X. Zhao, F. Zhang, S. Guo, L. Wu, W. Li, X. Lou "Security Evaluation for Fault Attacks on Lightweight Block Cipher Midori," Journal of Cryptologic Research, Vol.4, No.1, pp.58-78, 2017. In Chinese.
  5. J. Wu, C. Kuang, K. Zeng, W. Qiao, F. Zhang*, X. Zhang, Z. Xu. "RGB-D Camera based Human Limb Movement Recognition and Tracking in Supine Positions," In PCM 2016, pp.705-714, 2016.
  6. J. Huang, B. Xi, P. Li, F. Zhang*, X. Zhao, "Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography," In Journal of Computer Science, Vol.43, No.7, pp.157-161, 2015.

毕业论文
  1. F. Zhang, Ph.D Thesis, "Towards Comprehensive Countermeasures to Power Analysis Attacks," 2011.
  2. F. Zhang, Master Thesis, "Identity Authentication and Access Control Based On Smartcard," (in Chinese), 2004.

如有需要,请邮件联系索取毕业论文电子件。





 

最后一次更新时间:
版权所有©2019: 张帆