|
|
|
SCI期刊论文
- F. Zhang, B. Yang, X. Dong, S. Guilley, Z. Liu*, W. He, F. G. Zhang, K. Ren, "Side-Channel Analysis and Countermeasure
Design on ARM-based Quantum-Resistant SIKE," IEEE Transactions on Computers, accepted (CCF-A).
- C. Ou, S. Lam, C. Zhou, G. Jiang, F. Zhang*, "A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks," IEEE Transactions on Computers, accepted (CCF-A).
- F. Zhang, X. Dong, B. Yang, Y. Zhou*, K. Ren, "A Systematic Evaluation of Wavelet-based Attack
Framework on Random Delay Countermeasures," IEEE Transactions on Information Forensics & Security, Vol.15, pp.1407-1422, 2020. [PDF] (CCF-A).
- F. Zhang*, G Xu, B. Yang, Z. Liang, K. Ren, "Theoretical Analysis of Persistent Fault Attack," SCIENCE CHINA Information Sciences, 2020, 63(3):139102. [PDF]
- F. Zhang, Y. Zhang, H. Jiang, X. Zhu, F. Lin*, K. Ren, "Precise Methods for Distinguishing S-box Faults in Laser Injection Attacks," IET Electronics Letters, Vol.55, No.25, pp.1333-1335, December 2019. [PDF] (ZJUTOP).
- Z. Liu, Y. Cao*, X. Zhang, C. Zhu, F. Zhang, "Managing recurrent virtual network updates in multi-tenant datacenters: A system perspective," IEEE Transactions on Parellel and Distributed Systems, Vol.30, No.8, pp.1816-1825, August 2019. [PDF] (CCF-A).
- J. T. Ning, J. Xu*, K. T. Liang, F. Zhang, E. -C. Chang, "Passive Attacks Against Searchable Encryption," IEEE Transactions on Information Forensics & Security, Vol.13, No.3, pp.789-802, March 2019. [PDF] (CCF-A).
- L. Dong, H. Zhang*, L. Zhu, S. Sun, H. Gan, F. Zhang*, "Analysis of an Optimal Fault Attack on an LED Lightweight Cryptosystem," IEEE Access, Vol.7, pp.31656-31662, 2019. [PDF]
- F. Zhang*, Z. Liang, B. Yang, X. Zhao, S. Guo, K. Ren, "Survey of design and security evaluation of authenticated encryption
algorithms in the CAESAR competition," Frontiers of Information Technology & Electronic Engineering., Vol.19, No.12, pp.1475-1499, 2018. [PDF]
- C. Xu, J. Shen*, X. Du, F. Zhang, "An Intrusion Detection System Using a Deep Neural Network With Gated Recurrent Units," IEEE Access, Vol.6, pp.48697-48707, 2018. [PDF]
- Y. K. Tang*, S. Q. Li, F. Zhang, L. Fang, "Thermal maps based HT detection using spatial projection transformation," IET Information Security, Vol.12, Issue.4, pp.356–361, 2018. [PDF]
- P. Zhou, T. Wang, X. Lou, X. Zhao, F. Zhang*, S. Guo, "Efficient flush-reload cache attack on scalar multiplication based signature algorithm," SCIENCE CHINA Information Sciences, 2018, 61:039102. [PDF]
- X. Zhao, F. Zhang*, S. Guo, Z. Gong, "Optimal Model Search for Hardware-Trojan-based Bit-level Fault Attacks on Block Ciphers," SCIENCE CHINA Information Sciences, 2018, 61(3):039106. [PDF]
- J. Shen*, L. Geng, F. Zhang, "Dynamic current logic based flip-flop design for robust and low power security ICs," Electronics Letters, Vol.53, No.18, pp.1236-1238, 2017. [PDF] (ZJU TOP)
- H. Chen, T. Wang, F. Zhang*, X. Zhao, W. He, L. Xu, Y. Ma, "Stealthy Hardware Trojan Based Algebraic Fault Analysis of HIGHT Block Cipher," Security and Communication Networks., Vol.2017, ArticleID 8051728, 2017. [PDF]
- F. Zhang, X. Zhao, W. He*, S. Bhasin, S. Guo, "Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers," SCIENCE CHINA Information Sciences, 2017, 60:048102. [PDF]
- H. Gan, H. Zhang*, M. Khan, X. Wang, F. Zhang, P. He, "An improved empirical mode decomposition for power analysis attack," China Communications, Vol.14, No.9, pp.94-99, 2017. [PDF]
- M. Khan, H. Zhang*, F. Zhang, S. Shahzad, R. Ullah, S. Ali, Q. Arain, M. Ahmed, "X-Band Power Amplifier for Next Generation Networks based on MESFET," China Communications, Vol.14, No.4, pp.11-19, 2017. [PDF]
- H. Chen, T. Wang, S. Guo, X. Zhao, F. Zhang*, J. Liu, "Improved Differential Fault analysis of SOSEMANUK with Algebraic Techniques," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences., Vol.E100-A, No.3, pp.811-821, 2017. [PDF]
- F. Zhang*, S. Guo, X. Zhao, T. Wang, J. Yang, F. -X. Standaert, D. Gu "A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," IEEE Transactions on Information Forensics & Security, Vol.11, No.5, pp.1039-1054, 2016. (CCF-A, IF=4.332) [PDF]
- F. Zhang, X. Zhao, S. Guo, J. Shen*, J. Huang, Z. Hu, "A Comprehensive Study of Algebraic Fault Analysis on PRINCE," China Communications, Vol.12, No.7, pp.127-141, 2015. [PDF]
- P. Zhou, T. Wang, G. Li, F. Zhang*, X. Zhao, "Analysis on the Parameter Selection Method for FLUSH+RELOAD based Cache Timing Attack on RSA," China Communications, Vol.12, No.6, pp.33-45, 2015. [PDF]
- S. Guo, X. Zhao, F. Zhang*, T. Wang, Z. Shi, F. -X Standaert, "Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations," IEEE Transactions on Information Forensics & Security, Vol.9, No.6, pp.999-1014, 2014. (CCF-A, IF=4.332) [PDF]
- X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, Z. Liu, J. Gallais, "A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES," Computers & Security, Vol.39: 173-189, 2013. [PDF]
- X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, H. Liu, K, Ji, J. Huang. "Efficient Hamming Weight based Side-Channel Cube Attacks on PRESENT," The Journal of Systems and Software, Vol. 86, Issue 3, pp. 728-743, 2013. [PDF]
- X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, and H. Luo, "Enhanced Side-Channel Cube Attacks on PRESENT," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Vol. E96-A, No. 1, pp. 332-339, 2013. [PDF]
会议论文
- Y. Chen, B. Xuan, C. Poskitt, J. Sun, F. Zhang*, "Active Fuzzing for Testing and Securing Cyber-Physical Systems," The ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), 2020. accepted (CCF-A).
- F. Zhang, B. Shao, G. Xu, B. Yang, Z. Yang*, Z. Qin, K. Ren, "From Homogeneous to Heterogeneous: Leveraging Deep Learning based Power Analysis on Cross Devices," Design Automation Conference (DAC), 2020. accepted (AR=23%, CCF-A).
- W. Liu, C. -H. Chang*, F. Zhang*, X. Lou, "Imperceptible Misclassification Attack on Deep
Learning Accelerator by Glitch Injection," Design Automation Conference (DAC), 2020. accepted (AR=23%, CCF-A).
- F. Zhang, Y. Zhang, H. Jiang, X. Zhu, S. Bhasin, Z. Liu*, D. Gu, K. Ren, "Persistent Fault Attack in Practice," IACR Transactions on Cryptographic Hardware and Embedded Systems, Vol. 2020, No.2, pp.172-195, 2020. (AR=23%, CCF-B).
- P. Chin, Y. Cao, L. Zhang, X. Zhao, F. Zhang*, "Locking Secret Data in the Vault Leveraging Fuzzy PUFs," In AsianHOST 2019, December 2019. accepted (Best Paper Candidate).
- F. Zhang, B. -L Yang, B. -J Yang*, Y. Zhang, S. Bhasin, K. Ren, "Fluctuating Power Logic: SCA protection by VDD randomization at the cell-level," In AsianHOST 2019, December 2019. accepted.
- X. Lou, F. Zhang*, G. Xu, Z. Liang, X. Zhao, S. Guo, K. Ren, "Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-Tolerance," In Inscrypt 2019, December 2019. accepted. (AR=24.5%, 23/94)
- Y. Zhang, F. Zhang*, B, Yang, G. Xu, B. Shao, X. Zhao, K. Ren, "Persistent Fault Injection in FPGA via BRAM Modification," In The 2019 IEEE Conference on Dependable and Secure Computing (IDSC 2019), November 2019. accepted.
- X. Cai, J. Yi, F. Zhang, S. Rajasekaran*, "Adversarial Structured Neural Network Pruning," In CIKM 2019, pp. 2433-2436, November 2019. (CCF-B, AR=21%, 100/470)
- Y. Chen, C. Poskitt, J. Sun, S. Adepu, F. Zhang*, "Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences," In 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), pp.962-973, 2019, San Diego, CA, USA. [PDF] (CCF-A, AR=21%, 93/455)
- W. Guo, Y. Cao, C. -H. Chang, M. Zhu, W. Ge, F. Zhang, "A Reliable Physical Unclonable Function Based on Differential Charging Capacitors," In ISCAS 2019, May 2019. accepted.
- J. Pan, F. Zhang, K. Ren, S. Bhasin, "One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis," In DATE 2019, pp. 1-6, March 2019. [PDF] (CCF-B, AR=24%, 202/834).
- S. Bhasin, J. Pan, F. Zhang, "Persistence Wears Down Resistance: Persistent Fault Analysis on Unprotected and Protected Block Cipher Implementations (Extended Abstract)," In SPACE 2018, December 2018. [PDF] [Slides] (Invited paper)
- X. Dong, F. Zhang*, S. Queshi, Y. Zhang, Z. Liang, F. Gao, "A Wavelet-based Power Analysis Attack against Random Delay Countermeasure," In AsianHOST 2018, pp.19-24, December 2018. [PDF]
- F. Zhang, X. Dong, Y. Zhang, X. Lou, Y. Wang, S. Qureshi, X. Zhao, Y. Tang "Theoretical Round Modification Fault Analysis on AEGIS-128 with Algebraic Techniques," In MASS 2018, pp.335-343, October 2018.
- F. Zhang*, X. Lou, X. Zhao, S. Bhasin, W. He, R. Ding, S. Qureshi, K. Ren, "Persistent Fault Analysis on Block Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, pp.150-172, 2018. [PDF] [Video] [PPT] (CCF-B, the same paper won Best Paper Award in ChinaCrypt 2018).
- X. Cai, S. Rajasekaran*, F. Zhang, "Efficient Approximate Algorithms for the Closest Pair Problem in High Dimensional Spaces," In PAKDD 2018, pp.151-163, June 2018. [PDF]
- F. Zhang*, L. Geng, J. Shen, S. Bhasin, X. Zhao, S. Guo, "Improved low-entropy masking scheme for LED with mitigation against correlation-enhanced collision attacks," In AsianHOST 2017, pp.49-54, 2017. [PDF]
- X. Zhao, S. Guo, F. Zhang, T. Wang, Z. Shi, M. Chu, D. Gu, "Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering," In FTDC 2014, pp.29-39, 2014. [PDF]
- F. Zhang, X. Zhao, S. Guo, T. Wang, and Z. Shi, "Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers," In COSADE 2013, LNCS, vol. 7864, pp. 62-79, March 7-8, 2013. [PDF]
- X. Zhao, S. Guo, F. Zhang, Z. Shi, T. Wang, "Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques," In FDTC 2013, pp. 41-51, August, 2013. [PDF]
- X. Zhao, F. Zhang, T. Wang, S. Guo, Z. Shi, H. Liu, K. Ji. "MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation," In COSADE 2012, LNCS, vol. 7275, pp. 231-248, 2012. [PDF] (Best Paper Award)
- F. Zhang, Z. Shi, "Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool," In ITNG 2011, pp. 359-365, April 2011. [PDF]
- S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, "Making Register File Resistant to Power Analysis Attacks," In ICCD 2008, pp. 577-582, October 2008. [PDF]
- F. Zhang, Z. Shi, "An Efficient Window-based Countermeasure to Power Analysis of ECC Algorithms," In ITNG 2008, pp. 120-126, April 2008.[PDF]
- F. Zhang, Z. Shi, B. Wang, "Chord-based Key Establishment Schemes for Sensor Networks," In ITNG 2008, pp. 731-737, April 2008. [PDF]
- F. Zhang, Z. Shi, "Power Analysis Attacks on ECC Randomized Automata," In ITNG 2007, pp. 900-901, April 2007. [PDF]
- Z. Shi, F. Zhang, "New Attacks on Randomized ECC Algorithms," In EITC 2006, pp. 22-25, August 2006. [PDF]
EI期刊论文
- P. Zhou, T. Wang, X. Zhao, F. Zhang*, "Flush-Reload Cache timing attack on SM2 digital signature algorithm," Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol.46, No.3, pp.24-29, 2018. In Chinese.
- Y. Ma, T. Wang*, H. Chen, F. Zhang, X. Lou, L. Xu, W. Yang, "Fault Cube Attack on SIMON Family of Lightweight Block Ciphers," Journal of Zhejiang University (Engineering Science), Vol.51, No.9, pp.1770-1779, 2017. In Chinese.
- H. Chen*, T. Wang, F. Zhang, X. Zhao, "Fault-based guess-and-determine attack on SOSEMANUK," Journal of Huazhong University of Science and Technology (Natural Science Edition), Vol.45, No.2, pp.72-77, 2017. In Chinese.
- J. Huang, X. Zhao*, F. Zhang, S. Guo, P. Zhou, J. Yang, "Improvement and Evaluation for Algebraic Fault Attacks on PRESENT," Journal on Communications, Vol.37, No.8, pp.144-156, 2016. In Chinese.
- H. Gan*, H. Zhang, J. Li, F. Zhang, X. Zhao, P. He, "Independent component analysis applied in electromagnetic attack," Chinese Journal of Radio Science, Vol.31, No.2, pp.401-405, 2016. In Chinese.
- H. Gan, H. Zhang, F. Zhang*, X. Zhao, P. He, "Electromagnetic Information Leakage Acquisition and Pretreatment," Chinese Journal of Radio Science, Vol.30, No.5, pp.1004-1008, 2015. In Chinese.
- H. Zhang, J. Li, F. Zhang*, H. Gan, P. He, "A Study on Template Attack of Chip Base on Side Channel Power Leakage," Chinese Journal of Radio Science, Vol.30, No.5, pp.987-992, 2015. In Chinese.
- H. Chen*, T. Wang, F. Zhang, X. Zhao, Y. Sun, "Algebraic Fault Analysis on HIGHT," Journal of Shanghai Jiaotong University, Vol.49, No.12, pp.1817-1825, 2015. In Chinese.
- X. Wang, S. Guo, X. Zhao, M. Song, F. Zhang, "Research of power preprocessing optimization-based template attack on LED," Journal on Communications, Vol.35, No.3, pp.157-167, 2014. In Chinese.
- X. Zhao, S. Guo, T. Wang, F. Zhang, H. Liu, J. Huang, P. Wang, "Research of Algebraic Fault Analysis on Piccolo," Chinese Journal of Computers, Vol.36, No.4, pp.882-894, 2013. In Chinese.
- H. Liu, X. Zhao, T. Wang, S. Guo, F. Zhang, J. Ke, "Research of Hamming Weight-Based Algebraic Side-Channel Attacks on SMS4," Chinese Journal of Computers, Vol.36, No.6, pp.1183-1193, 2013. In Chinese.
- X. Zhao, S. Guo, T. Wang*, F. Zhang, Z. Shi, "Fault-Propagate Pattern based DFA on PRESENT and PRINTcipher," Wuhan University Journal of Natural Sciences. Vol. 17, No. 6, pp. 485-493, 2012.[PDF]
- T. Wang, X. Zhao, S. Guo, F. Zhang, H. Liu, and T. Zheng, "Research of Cache Timing Template Attacks on AES," (in Chinese) Chinese Journal of Computers. Vol. 2, No. 1, pp. 325-341, February 2012.
- F. Zhang, S. Zhang, Y. Tang, W. Dai, "Design on Smart card-based Secure Logon System," Information Security and Communications Privacy, 2004(3):38-41. In Chinese.
专著的部分章节
- F. Zhang, B. Shao, W. Gu, "Artificial Intelligence with Side Channle Analysis," (人工智能之于旁路分析) in Communications of the CCF, Vol.15, Issue.7, Editors: K. Ren, (Eds.), July 2019.[PDF]
- F. Zhang, B. Yang, G. Xu, X. Lou, S. Bhasin, K. Ren, "Improvements and recent updates of persistent fault analysis on block ciphers," in Book Frontiers in Hardware Security and Trust, Editors: Chang Chip-Hong, Cao Yuan, (Eds.) 2019.
- F. Zhang, B. Yang, S. Guo, X. Zhao, T. Wang, F. -X. Standaert, D. Gu, "An Automated Framework for Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," in Book Automated Methods in Cryptographic Fault Analysis, Editors: Breier, Jakub, Hou, Xiaolu, Bhasin, Shivam (Eds.) 2018.
- Y. Yao, F. Zhang, and Y. Fu, "Realtime Hand-Gesture Recognition Using
RGB-D Sensor," in Book Computer Vision and Machine Learning with RGB-D Sensors, pp.289-313, 2014.
- Z. Shi, B. Wang, F. Zhang, "CBKE: Chord-based Key Establishment Schemes for Wireless Sensor Networks," Chapter in Handbook on Sensor Networks, (Xiao, Chen and Li, eds.), pp. 399-418, World Scientific Publishing Company, August 2010.[PDF]
其他论文
- A. Wang*, J. Ge, N. Shang, F. Zhang, G Zhang, "Practical Cases of Side-channel Analysis," Journal of Cryptologic Research, Vol.5, Issue.4, pp.383-398, 2018. In Chinese.
- X. Lou, F. Zhang*, J. Huang, X. Zhao, H. Liu, "Research on Trace Driven Cache Analysis on SM4," Journal of Cryptologic Research, Vol.5, Issue.4, pp.430-441, 2018. In Chinese.
- H. Chen*, T. Wang, X. Zhao, F. Zhang, Y. Ma, X. Wang, "Research of fault-tolerant algebraic fault attack on HIGHT," Journal of Nanjing University(Natural Science), Vol.53, No.6, pp.1141-1152, 2017. In Chinese.
- Y. Wang, X. Zhao, F. Zhang, S. Guo, L. Wu, W. Li, X. Lou "Security Evaluation for Fault Attacks on Lightweight Block Cipher Midori," Journal of Cryptologic Research, Vol.4, No.1, pp.58-78, 2017. In Chinese.
- J. Wu, C. Kuang, K. Zeng, W. Qiao, F. Zhang*, X. Zhang, Z. Xu. "RGB-D Camera based Human Limb Movement Recognition and Tracking in Supine Positions," In PCM 2016, pp.705-714, 2016.
- J. Huang, B. Xi, P. Li, F. Zhang*, X. Zhao, "Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography," In Journal of Computer Science, Vol.43, No.7, pp.157-161, 2015.
毕业论文
- F. Zhang, Ph.D Thesis, "Towards Comprehensive Countermeasures to Power Analysis Attacks," 2011.
- F. Zhang, Master Thesis, "Identity Authentication and Access Control Based On Smartcard," (in Chinese), 2004.
如有需要,请邮件联系索取毕业论文电子件。
|
|