|
|
|
Selected Publications
For the full list, please check here.
- F. Zhang, B. Shao, W. Gu, "Artificial Intelligence with Side Channle Analysis," (人工智能之于旁路分析) in Communications of the CCF, Vol.15, Issue.7, Editors: K. Ren, (Eds.), July 2019.[PDF]
- Y. Chen, C. Poskitt, J. Sun, S. Adepu, F. Zhang*, "Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences," In ASE 2019, Nov 2019. [PDF] (CCF-A, AR=21%, 93/455)
- F. Zhang*, X. Lou, X. Zhao, S. Bhasin, W. He, R. Ding, S. Qureshi, K. Ren, "Persistent Fault Analysis on Block Ciphers," IACR Transactions on Cryptographic Hardware and Embedded Systems, Issue 3, pp.150-172, 2018. [PDF] [Video] [PPT] (CCF-B, the same paper won Best Paper Award in ChinaCrypt 2018).
- J. Pan, S. Bhasin, F. Zhang, K. Ren, "One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis," In DATE 2019, March 2019. (CCF-B, Top conferences in EDA).
- F. Zhang*, Z. Liang, B. Yang, X. Zhao, S. Guo, K. Ren, "Survey of design and security evaluation of authenticated encryption
algorithms in the CAESAR competition," Frontiers of Information Technology & Electronic Engineering., Vol.19, No.12, pp.1475-1499, 2018. [PDF]
- J. T. Ning, J. Xu*, K. T. Liang, F. Zhang, E. -C. Chang, "Passive Attacks Against Searchable Encryption," IEEE Transactions on Information Forensics & Security, Vol.13, Issue.3, pp.789-802, 2019. [PDF] (CCF-A, IF=4.332).
- J. Shen*, L. Geng, F. Zhang, "Dynamic current logic based flip-flop design for robust and low power security ICs," Electronics Letters, Vol.53, No.18, pp.1236-1238, 2017. [PDF] (ZJU TOP)
- F. Zhang, X. Zhao, W. He*, S. Bhasin, S. Guo, "Low-cost design of stealthy hardware trojan for bit-level fault attacks on block ciphers," SCIENCE CHINA Information Sciences, 2017, 60:048102. [PDF]
- F. Zhang*, S. Guo, X. Zhao, T. Wang, J. Yang, F. -X. Standaert, D. Gu "A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers," IEEE Transactions on Information Forensics & Security, Vol.11, No.5, pp.1039-1054, 2016. (CCF-A, IF=4.332) [PDF]
- S. Guo, X. Zhao, F. Zhang*, T. Wang, Z. Shi, F. -X Standaert, "Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack against the AES and its Application to Microcontroller Implementations," IEEE Transactions on Information Forensics & Security, Vol.9, No.6, pp.999-1014, 2014. (CCF-A, IF=4.332) [PDF]
- X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, Z. Liu, J. Gallais, "A Comprehensive Study of Multiple Deductions-based Algebraic Trace Driven Cache Attacks on AES," Computers & Security, Vol.39: 173-189, 2013. [PDF]
- X. Zhao, S. Guo, F. Zhang*, T. Wang, Z. Shi, H. Liu, K, Ji, J. Huang. "Efficient Hamming Weight based Side-Channel Cube Attacks on PRESENT," The Journal of Systems and Software, Vol. 86, Issue 3, pp. 728-743, 2013. [PDF]
- X. Zhao, F. Zhang, T. Wang, S. Guo, Z. Shi, H. Liu, K. Ji. "MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation," In COSADE 2012, LNCS, vol. 7275, pp. 231-248, 2012. [PDF] (Best Paper Award)
- S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, "Making Register File Resistant to Power Analysis Attacks," In ICCD 2008, pp. 577-582, October 2008. [PDF]
|
|