-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
401 lines (344 loc) · 27.5 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN" "http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<!-- Google tag (gtag.js) -->
<script async src="https://www.googletagmanager.com/gtag/js?id=G-VZ8EFJ7P4P"></script>
<script>
window.dataLayer = window.dataLayer || [];
function gtag(){dataLayer.push(arguments);}
gtag('js', new Date());
gtag('config', 'G-VZ8EFJ7P4P');
</script>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>Ziming Zhao</title>
<meta name="keywords" content="Ziming Zhao" />
<link rel="stylesheet" type="text/css" href="simplest.css">
<link rel="stylesheet" href="flag-icons.min.css">
<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.3/jquery.min.js"></script>
<script src="./toggle.js"></script>
<script src="./mergeSort.js"></script>
</head>
<body>
<div class="container">
<div class="content">
<table>
<tr>
<td rowspan="3">
<img src="ziming.jpg" height="180" alt="pic" />
</td>
<td>
<h2>Ziming Zhao
<img src="Simplified Name.JPG" height="20" alt="Ziming's Chinese Name" />
</h2>
<p>Associate Professor</p>
<p>Khoury College of Computer Sciences</p>
<p>Northeastern University</p>
<p>z.zhao AT northeastern.edu</p>
</td>
</tr>
<!--<tr>
<td>
<a href="http://scholar.google.com/citations?user=l6M4h_YAAAAJ&hl=en"><img src="scholar_logo_lg_2011.gif" height="30" alt="View Ziming's profile on Google Scholar" /></a>
<a href="http://www.linkedin.com/pub/ziming-zhao/b/905/1b1"><img src="http://www.linkedin.com/img/webpromo/btn_myprofile_160x33.png" height="28" alt="View Ziming's profile on LinkedIn" /></a>
<a href="https://github.com/zzm7000"><img src="GitHub_Logo.png" height="28" alt="View Ziming's profile on GitHub" /></a>
<br />
<a href="http://www.flickr.com/photos/zimingzhao/"><img src="black-im-on-flickr.png" height="28" alt="Ziming's flickr" /></a>
<a href="https://www.youtube.com/user/zzm7000/videos?view=0&sort=dd&shelf_id=1"><img src="YouTube-logo-full_color.png" height="25" alt="Ziming's Youtube"/></a>
</td>
</tr> -->
</table>
<p>I am an associate professor in the Khoury College of Computer Sciences at Northeastern University. I direct the <a href="http://cactilab.github.io">CyberspACe securiTy and forensIcs lab (CactiLab)</a>. My research interests are in <strong>Systems and Software Security</strong>, Network and Web Security, and Human-centric Security. I am a recipient of the <strong>Test-of-Time Paper Award</strong> at <strong>SACMAT</strong> 2024 and <strong>Best/Distinguished Paper Awards</strong> at <strong>USENIX Security</strong> 2019, <strong>ACM AsiaCCS</strong> 2022, <strong>ACM CODASPY</strong> 2014, and <strong>ITU Kaleidoscope</strong> 2016. I got my PhD from Arizona State University CSE.</p>
<p>My research has been supported by National Science Foundation (NSF), National Centers of Academic Excellence in Cybersecurity (NCAE-C), and Department of Defense (DoD). I am a recipient of an <strong>NSF CAREER</strong> award and an <strong>NSF CRII</strong> award. I was a visiting faculty at the Air Force Office of Scientific Research (AFOSR) in 2020/2021.</p>
<p>I am the faculty advisor and the founder of the CTF teams Cacti (all kinds of CTFs) and TigerBytes (hardware CTFs).</p>
<p><strong>I have multiple RA openings starting Fall 2025. See my <a href="./ad2024.pdf">ads</a>.</strong></p>
<!--<p style="color:#005bbb; font-weight:bold">I am looking for self-motivated PhD students to work on security.</p>
If you are interested, please take a look at <a href="./ad.pdf">my ad</a>. Our <a href="http://phd.gccis.edu.edu">PhD program</a> in Computing and Information Sciences is ranked <a href="https://www.usnews.com/best-graduate-schools/top-science-schools/computer-science-rankings">#68</a> in US News Best CS Programs and <a href="http://csrankings.org">#66</a> in CSRankings.org</p>
-->
<!--<p><a href="https://www.ndss-symposium.org/ndss2023/submissions/cfp-vehiclesec/"><font color="red">[CFP]</font> Call for Papers: Inaugural Symposium on Vehicle Security and Privacy
(VehicleSec 2023)</a> </p> -->
<h2>Awards and Recognitions</h2>
<ul>
<li><a href="https://engineering.buffalo.edu/computer-science-engineering/news-and-events/news.host.html/content/shared/engineering/home/articles/news-articles/2024/nouh--singisetti-and-xia-receive-ub-award-for-sustained-achievem.detail.html">University at Buffalo Teaching Innovation Award</a>, 2024</li>
<li><a href="https://engineering.buffalo.edu/home/news/seas.host.html/content/shared/engineering/home/articles/news-articles/2024/hongxin-and-zhao-receive-test-of-time-award.detail.html">ACM SACMAT Test-of-time Paper Award</a>, 2024</li>
<li><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2237238&HistoricalAwards=false">NSF CAREER Award</a>, 2023</li>
<li>2nd Place in UB Russell L. Agrusa CSE Innovation Competition, 2023</li>
<li>ACM AsiaCCS Best Paper Award, 2022</li>
<li>UB CSE Early Career Faculty Teaching Award, 2022</li>
<li>UB CSE Career Initiation Award, 2021</li>
<li><a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=2037798&HistoricalAwards=false">NSF CRII Award</a>, 2021</li>
<li>USENIX Security Distingushed Paper Award, 2019</li>
<li>ITU Kaleidoscope Best Paper Award, 2016</li>
<li>3rd place Extreme Networks SDN Innovation Challenge, 2015</li>
<li>ACM CODASPY Best Paper Award, 2014</li>
</ul>
<h2>Teaching</h2>
<ul>
<li><a href="./teaching/2024fallcy5770/index.html">Fall 2024, NEU CY 5770 Software Vulnerabilities and Security</a> </li>
<li><a href="./teaching/2024springcse712/index.html">Spring 2024, UB CSE 712 Seminar: Microcontroller Systems Security</a> </li>
<li><a href="./teaching/2023fallcse410518/index.html">Fall 2023, UB CSE 410/518 Software Security</a> Student Evaluation: 5/5 (410), 4.8/5 (518)</li>
<li><a href="./teaching/2023springcse410565/index.html">Spring 2023, UB CSE 410/565 Computer Security</a> Student Evaluation: 4.8/5 (410), 4.3/5 (565)</li>
<li><a href="./teaching/2022fallcse410510/index.html">Fall 2022, UB CSE 410/510 Software Security.</a> Student Evaluation: 4.8/5</li>
<li><a href="./teaching/2022springcse410510/index.html">Spring 2022, UB CSE 410/510 Software Security.</a> Student Evaluation: 4.4/5</li>
<li><a href="./teaching/2021fallcse410510/index.html">Fall 2021, UB CSE 410/510 Software Security.</a> Student Evaluation: 4.8/5</li>
<li><a href="./teaching/2021springcse703/index.html">Spring 2021, UB CSE 703 Seminar: Advanced Software Security - Techniques and Tools</a></li>
<li><a href="./teaching/2020fallcse610/index.html">Fall 2020, UB CSE 610 Special Topics: System Security - Attack and Defense for Binaries.</a> Student Evaluation: 4.8/5</li>
<li>Spring 2020, RIT CSEC 741 Internet of Things Security.</li>
<li>Fall 2019, RIT CSEC 659 Seminar in Computing Security: Trusted Computing and Trusted Execution. Student Evaluation: 4.5/5</li>
<li>Spring 2019, RIT CSEC 741 Sensor and SCADA Security. Student Evaluation: 4.45/5</li>
<li>Fall 2018, RIT CSEC 750 Covert Communications.</li>
<li>Spring 2018, ASU CSE 469 Computer and Network Forensics.</li>
<li>Spring 2017, ASU CSE 469 Computer and Network Forensics. Student Evaluation: 4.49/5</li>
<li>Fall 2016, ASU CSE 468 Computer Network Security. Student Evaluation: 4.49/5</li>
</ul>
<!--
<h2>
Research
</h2>
<table>
<tr>
<td rowspan="3">
<img src="ri.png" height="500" alt="pic" />
</td>
</tr>
</table>
<h3>
Selected Funded Projects
</h3>
<p>For the full list of funded projects, please refer to <a href="https://cactilab.github.io/fundings/">CactiLab Website</a>.</p>
<ul>
<li class="projects" data-time="20240630">
NSF. CAREER: SaTC: Rethinking Trusted Execution Environments for Embedded and IoT Systems, 2023 - 2028<br />
PI: <span class="self">Ziming Zhao</span><br>
<br />
</li>
<li class="projects" data-time="20240630">
NCAE. HACF: Building High Assurance Containers Using FPGA, 2022 - 2024<br />
PI: <span class="self">Ziming Zhao</span>, Co-PIs: Hongxin Hu, Shambhu Upadhyaya<br>
<br />
</li>
<li class="projects" data-time="20240630">
NSF. CRII: SaTC: Securing Internet of Things Against Cache-based Attacks, 2020 - 2023<br />
PI: <span class="self">Ziming Zhao</span><br>
</li>
</ul>
-->
<h2>
Selected Publications
</h2>
<p>For the full list of publications, please refer to <a href="https://cactilab.github.io/publications/">CactiLab Website</a>.</p>
<!-- <a class="toggle_link" href="javascript:toggle('data-time', false)">Sort by year</a> |
<a class="toggle_link" href="javascript:toggle('data-topic', false)">Sort by topic</a> |
<a class="toggle_link" href="javascript:toggle('data-venue', false)">Sort by venue</a> |
<a class="toggle_link" href="javascript:toggle('data-type', false)">Sort by type</a>
<div class="anchors" style="display: none;"></div> -->
<div class="publications">
</div>
<h2>Ph.D. Graduates</h2>
<ul>
<li><a href="https://tomal-kuet.github.io/armanuzzaman/">Md Armanuzzaman</a> <i class="fi fi-bd"></i> Dissertation: Augmenting and Utilizing Trusted Execution Environments For Embedded System Security. University at Buffalo. 2024. (Postdoc at Northeastern University)</li>
<li><a href="https://mintancy.github.io/">Xi Tan</a> <i class="fi fi-cn"></i> Dissertation: Control-flow Security For Microcontroller-based Systems. University at Buffalo. 2024. (Assistant Professor at University of Colorado Colorado Springs)</li>
<li><a href="https://www.cong-wu.com/">Cong Wu</a> <i class="fi fi-cn"></i> Dissertation: Research on Secure and Usable Biometric Authentication for Mobile Terminal. Wuhan University. 2022. (Co-advised with Prof. Jing Chen)</li>
<li>Wonkyu Han <i class="fi fi-kr"></i> Dissertation: Policy-driven Network Defense for Software Defined Networks. Arizona State University. 2016. (Co-advised with Prof. Gail-Joon Ahn)</li>
</ul>
<p>Last updated 8/2024</p>
</div>
</div>
<div id="publicationdatabase" style="display: none;">
<ul>
<li class="publication" data-time="20240801" data-venue="BIG4" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning</span>
<br>Cong Wu, Jing Chen, <span class="self">Ziming Zhao</span>, Kun He, Guowen Xu, Yueming Wu, Haijun Wang, Hongwei Li, Yang Liu, Yang Xiang<br>
ACM Conference on Computer and Communications Security (<span class="abbr">CCS</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20240801" data-venue="BIG4" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">Unveiling IoT Security in Reality: A Firmware-Centric Journey</span>
<br>Nicolas Nino, Ruibo Lu, Wei Zhou, Kyu Hyung Lee, <span class="self">Ziming Zhao</span>, Le Guan<br>
USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20240801" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision Language Models</span>
<br>Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, <span class="self">Ziming Zhao</span>, Guo Freeman, Nishant Vishwamitra, and Hongxin Hu<br>
USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20240701" data-venue="RTAS" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">InsectACIDE: Debugger-Based Holistic Asynchronous CFI for Embedded System</span>
<br>Yujie Wang, Cailani Lemieux Mack, Xi Tan, Ning Zhang, <span class="self">Ziming Zhao</span>, Sanjoy Baruah, and Bryan C. Ward<br>
IEEE Real-Time and Embedded Technology and Applications Symposium (<span class="abbr">RTAS</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20240701" data-venue="arXiv" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">Where’s the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems</span>
<br>Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, and <span class="self">Ziming Zhao</span><br>
USENIX WOOT Conference on Offensive Technologies (<span class="abbr">WOOT</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20240701" data-venue="AsiaCCS" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">Building Your Own Trusted Execution Environments Using FPGA</span>
<br>Md Armanuzzaman, Ahmad-Reza Sadeghi, <span class="self">Ziming Zhao</span><br>
ACM Asia Conference on Computer and Communications Security (<span class="abbr">AsiaCCS</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20240630" data-venue="Oakland" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models</span>
<br>Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, <span class="self">Ziming Zhao</span> and Hongxin Hu<br>
IEEE Symposium on Security and Privacy (<span class="abbr">Oakland</span>), 2024
<br />
<br />
</li>
<li class="publication" data-time="20231120" data-venue="CCS" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">SHERLOC: Secure and Holistic Control-Flow Violation Detection on Embedded Systems</span>
<br>Xi Tan and <span class="self">Ziming Zhao</span><br>
ACM Conference on Computer and Communications Security (<span class="abbr">CCS</span>), 2023
<br />
<br />
</li>
<li class="publication" data-time="20230709" data-venue="DAC" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense</span>
<br>Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu and <span class="self">Ziming Zhao</span><br>
ACM/IEEE Design Automation Conference (<span class="abbr">DAC</span>), 2023
<br />
<br />
</li>
<li class="publication" data-time="20230811" data-venue="BIG4" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses</span>
<br>Feng Wei, Hongda Li, <span class="self">Ziming Zhao</span>, Hongxin Hu<br>
USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2023
<br />
<br />
</li>
<li class="publication" data-time="20221107" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices</span>
<br>Cong Wu, Jing Chen, Kun He, <span class="self">Ziming Zhao</span>, Ruiying Du, and Chen Zhang<br>
ACM Conference on Computer and Communications Security (<span class="abbr">CCS</span>), 2022
<br />
<br />
</li>
<li class="publication" data-time="20220601" data-venue="AsiaCCS" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">Understanding and Detecting Remote Infection on Linux-based IoT Devices</span>
<br>Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, <span class="self">Ziming Zhao</span><br>
ACM Asia Conference on Computer and Communications Security (<span class="abbr">AsiaCCS</span>), 2022 (<strong>Best Paper Award</strong>)
<br />
<br />
</li>
<li class="publication" data-time="20210201" data-venue="BIG4" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">A Formal Analysis of the FIDO UAF Protocol</span>
<br>Haonan Feng, Hui Li, Xuesong Pan, <span class="self">Ziming Zhao</span><br>
Network and Distributed System Security Symposium (<span class="abbr">NDSS</span>), 2021
<br />
<br />
</li>
<li class="publication" data-time="20210701" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service</span>
<br>Zhibo Sun, Adam Oest, Penghui Zhang, Carlos Rubio-Medrano, Tiffany Bao, Ruoyu Wang, <span class="self">Ziming Zhao</span>, Yan Shoshitaishvili, Adam Doupe, and Gail-Joon Ahn<br>
USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2021
<br />
<br />
</li>
<li class="publication" data-time="20200601" data-venue="MobiSys" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">SmokeBomb: Effective Mitigation Against Cache Side-channel Attacks on the ARM Architecture</span>
<br>Haehyun Cho, Jinbum Park, Donguk Kim, <span class="self">Ziming Zhao</span>, Yan Shoshitaishvili, Adam Doupe, Gail-Joon Ahn<br>
ACM International Conference on Mobile Systems, Applications, and Services (<span class="abbr">MobiSys</span>), 2020
<br />
<br />
</li>
<li class="publication" data-time="20200801" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks</span>
<br>Cong Wu, Kun He, Jing Chen, <span class="self">Ziming Zhao</span>, Ruiying Du<br>
USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2020
<br />
<br />
</li>
<li class="publication" data-time="20200301" data-venue="CODASPY" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection</span>
<br>Stuart Millar, Niall McLaughlin, Jesus Martinez del Rincon, Paul Miller, <span class="self">Ziming Zhao</span><br>
ACM Conference on Data and Application Security and Privacy (<span class="abbr">CODASPY</span>), 2020
<br />
<br />
</li>
<li class="publication" data-time="20191101" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues</span>
<br>Faris Bugra Kokulu, Ananta Soneji, Tiffany Bao, Yan Shoshitaishvili, <span class="self">Ziming Zhao</span>, Adam Doupé, and Gail-Joon Ahn<br>
ACM Conference on Computer and Communications Security (<span class="abbr">CCS</span>), 2019
<br />
<br />
</li>
<li class="publication" data-time="20190801" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">Users Really Do Answer Telephone Scams</span>
<br>Huahong Tu, Adam Doupé, <span class="self">Ziming Zhao</span>, and Gail-Joon Ahn<br>
USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2019 (<strong>Distinguished Paper Award</strong>)
<br />
<br />
</li>
<li class="publication" data-time="20181201" data-venue="ACSAC" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling</span>
<br>Jaejong Baek, Sukwha Kyung, Haehyun Cho, <span class="self">Ziming Zhao</span>, Adam Doupé, Yan Shoshitaishvili, and Gail-Joon Ahn<br>
Annual Computer Security Applications Conference (<span class="abbr">ACSAC</span>), 2018
<br />
<br />
</li>
<li class="publication" data-time="20181201" data-venue="ACSAC" data-topic="Area-1: Systems and Software Security" data-type="Conferences">
<span class="paper_title">Prime+Count: Novel Cross-world Covert Channels on ARM TrustZone</span>
<br>Haehyun Cho, Penghui Zhang, Donguk Kim, Jinbum Park, Choonghoon Lee, <span class="self">Ziming Zhao</span>, Adam Doupé, and Gail-Joon Ahn<br>
Annual Computer Security Applications Conference (<span class="abbr">ACSAC</span>), 2018
<br />
<br />
</li>
<li class="publication" data-time="20181022" data-venue="BIG4" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">AIM-SDN: Attacking Information Mismanagement in SDN-datastores</span>
<br>Vaibhav Hemant Dixit, Adam Doupé, Yan Shoshitaishvili, <span class="self">Ziming Zhao</span> and Gail-Joon Ahn<br>
ACM Conference on Computer and Communications Security (<span class="abbr">CCS</span>), 2018
<br />
<br />
</li>
<li class="publication" data-time="20170508" data-venue="AAMAS" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">A Game Theoretic Approach in Strategy Generation for Moving Target Defense in Web Applications</span> <br />
Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Adam Doupe, Marthony Taguinod, <span class="self">Ziming Zhao</span> and Gail-Joon Ahn<br/>
16th International Conference on Autonomous Agents and Multiagent Systems (<span class="abbr">AAMAS</span>), 2017
<br />
<br />
</li>
<li class="publication" data-time="20170301" data-venue="BIG4" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">On the Safety and Efficiency of Virtual Firewall Elasticity Control</span>
<br />
Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, <span class="self">Ziming Zhao</span> and Wonkyu Han<br/>
24th Network and Distributed System Security Symposium (<span class="abbr">NDSS</span>), 2017
<br />
<br />
</li>
<li class="publication" data-time="20160523" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences">
<span class="paper_title">SoK: Everyone Hates Robocalls: A Survey of Techniques against Telephony Spam</span>
<br />
Huahong Tu, Adam Doupé, <span class="self">Ziming Zhao</span> and Gail-Joon Ahn<br />
37th IEEE Symposium on Security and Privacy (<span class="abbr">Oakland</span>), 2016
<br />
<br />
</li>
<li class="publication" data-time="20140601" data-venue="SACMAT" data-topic="Area-2: Network and Web Security" data-type="Conferences">
<span class="paper_title">Game Theoretic Analysis of Multiparty Access Control in Online Social Networks</span>
<br>Hongxin Hu, Gail-Joon Ahn, <span class="self">Ziming Zhao</span> and Dejun Yang<br>
ACM Symposium on Access Control Models and Technologies (<span class="abbr">SACMAT</span>), 2014 (<strong>Test of Time Award in SACMAT 2024</strong>)
<br />
<br />
</li>
<li class="publication" data-time="20130801" data-venue="BIG4" data-topic="Area-3: Human-centric Security" data-type="Conferences"><span class="paper_title">On the Security of Picture Gesture Authentication </span>
<br />
<span class="self">Ziming Zhao</span>, Gail-Joon Ahn</a>, Jeong-Jin Seo and Hongxin Hu<br />
22nd USENIX Security Symposium (<span class="abbr">SECURITY</span>), 2013
<br />
<br />
</li>
</div>
<script type="text/javascript">
$(document).ready(toggle('data-topic', false));
</script>
</body>
</html>