Zirui (Neil) Zhao
Zirui (Neil) Zhao
University of Illinois at Urbana-Champaign
Verified email at
Cited by
Cited by
Speculative Interference Attacks: Breaking Invisible Speculation Schemes
M Behnia, P Sahu, R Paccagnella, J Yu, ZN Zhao, X Zou, T Unterluggauer, ...
Proceedings of the 26th ACM International Conference on Architectural …, 2021
Speculation Invariance (InvarSpec): Faster Safe Execution Through Program Analysis
ZN Zhao, H Ji, M Yan, J Yu, CW Fletcher, A Morrison, D Marinov, ...
2020 53rd Annual IEEE/ACM International Symposium on Microarchitecture …, 2020
Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs
H Xu, ZN Zhao, Y Zhou, MR Lyu
IEEE Transactions on Dependable and Secure Computing, 2018
DeepObfuscation: Securing the Structure of Convolutional Neural Networks via Knowledge Distillation
H Xu, Y Su, ZN Zhao, Y Zhou, MR Lyu, I King
arXiv preprint arXiv:1806.10313, 2018
Jamais Vu: Thwarting Microarchitectural Replay Attacks
D Skarlatos, ZN Zhao, R Paccagnella, CW Fletcher, J Torrellas
PaCon: A Symbolic Analysis Approach for Tactic-Oriented Clustering of Programming Submissions
Y Fu, J Osei-Owusu, A Astorga, ZN Zhao, W Zhang, T Xie
Proceedings of the 2021 ACM SIGPLAN International Symposium on SPLASH-E, 32-42, 2021
Pinned Loads: Taming Speculative Loads in Secure Processors
ZN Zhao, H Ji, A Morrison, D Marinov, J Torrellas
Proceedings of the 27th ACM International Conference on Architectural …, 2022
Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker
ZN Zhao, A Morrison, CW Fletcher, J Torrellas
31st USENIX Security Symposium (USENIX Security 22), 699-716, 2022
The system can't perform the operation now. Try again later.
Articles 1–8