Sotabase
Home
Researchers
Career
·
Postdoctoral Researcher
,
Georgia Tech
2021–2022
·
PhD in Computer Science and Engineering
,
The Ohio State University
2015–2021
·
Assistant Professor
,
George Mason University
·
Bachelor's degree in Computer Science
,
Shanghai Jiao Tong University
Publications
(50)
One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation
USENIX Security Symposium · 2016
264
cited
Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu
ACM Asia Conference on Computer and Communications Security · 2017
211
cited
HoMonit: Monitoring Smart Home Apps from Encrypted Traffic
Conference on Computer and Communications Security · 2018
197
cited
TXSPECTOR: Uncovering Attacks in Ethereum from Transactions
USENIX Security Symposium · 2020
108
cited
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices
Conference on Computer and Communications Security · 2016
74
cited
NARRATOR: Secure and Practical State Continuity for Trusted Execution in the Cloud
Conference on Computer and Communications Security · 2022
54
cited
Statistical Privacy for Streaming Traffic
Network and Distributed System Security Symposium · 2019
46
cited
Uncovering User Interactions on Smartphones via Contactless Wireless Charging Side Channels
IEEE Symposium on Security and Privacy · 2023
40
cited
OS-level Side Channels without Procfs: Exploring Cross-App Information Leakage on iOS
Network and Distributed System Security Symposium · 2018
34
cited
A Measurement Study of Authentication Rate-Limiting Mechanisms of Modern Websites
Asia-Pacific Computer Systems Architecture Conference · 2018
25
cited
You are where you have been: Sybil detection via geo-location analysis in OSNs
2014 IEEE Global Communications Conference · 2014
25
cited
An Empirical Study on Ethereum Private Transactions and the Security Implications
arXiv.org · 2022
23
cited
Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic
Conference on Computer and Communications Security · 2021
21
cited
SurfaceFleet: Exploring Distributed Interactions Unbounded from Device, Application, User, and Time
ACM Symposium on User Interface Software and Technology · 2020
20
cited
POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
USENIX Security Symposium · 2023
17
cited
Dissecting Click Fraud Autonomy in the Wild
Conference on Computer and Communications Security · 2021
16
cited
Ensuring State Continuity for Confidential Computing: A Blockchain-Based Approach
IEEE Transactions on Dependable and Secure Computing · 2024
9
cited
SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems
arXiv.org · 2023
9
cited
SOK: On the Analysis of Web Browser Security
arXiv.org · 2021
7
cited
Defeating traffic analysis via differential privacy: a case study on streaming traffic
International Journal of Information Security · 2022
6
cited
Show all 50 papers →
Sotabase