Biography
Dr. Wenhao Wang is an associate professor at Institute of Information Engineering (IIE) , CAS. His research interests now focus on protecting user privacy data with the help of hardware features, such as Intel SGX , as well as cryptographic techniques (e.g., homomorphic encryption). Ongoing projects also include designing new hardware based TEEs (trusted execution environments) to support large scale data processing. Dr. Wenhao Wang was a visiting scholar of Prof. XiaoFeng Wang ’s group in Indiana University Bloomington from April 2016 to August 2018, during which he worked closely with Prof. Wang and Prof. Haixu Tang in organizing the Genomic data privacy and security protection competition . Please find the cv here: in English , 中文 .
Please send an email to wangwenhao@iie.ac.cn if you would like to join the group. Students with interests in topics related to operating system/software/virtualization/hardware-assisted security/TEE/privacy preserving technologies/microarchitectural side channels etc., are all welcome.
News
[Aug. 2025] Two papers on efficient and privacy-preserving neural network inference have been accepted for presentation at S&P 2025 and NDSS 2026. The first paper leverages sparsity in Transformers to reduce computational costs, while the second introduces performance-efficient fine-tuning (PEFT) adapters specifically designed for private inference.
[Aug. 2025] One paper on side channel attacks is accepted by IEEE Transactions on Information Forensics and Security (TIFS). The paper demonstrates that the leakage in Dilithium’s NTT-based polynomial multiplication can be effectively exploited in template attacks, and proposes a multivariate template attack to significantly improve key-recovery efficiency in both simulated and real-world settings.
[Oct. 2024] One paper is accepted to appear at NDSS 2025. We proposed NestedSGX, which supports existing SGX toolchains (the adapted SGX SDK and Occlum library OS) and runs SGX applications atop AMD SEV-SNP confidential VMs (CVMs).
[July. 2024] One paper on side channel attacks is accepted by IEEE Transactions on Information Forensics and Security (TIFS). We showed that only 38, 40 and 39 power traces are enough to recover private key s1 of Dilithium 2, 3 and 5 with 100% of success rate.
Selected Publications (Full list: Google Scholar )
* Corresponding authors, [ ] Equal Contributions, Advised by me
0
0
1
2
1
3
2
4
5
6
7
8
3
4
9
10
5
6
11
12
13
14
15
16
17
7
18
19
20
8
Saisai Xia , Wenhao Wang* , Zihao Wang*, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou
Network and Distributed System Security Symposium (NDSS) 2026 (CCF-A)
Haopeng Fan , Hailong Zhang*, Yongjuan Wang*, Wenhao Wang , Haojin Zhang, Qingjun Yuan
IEEE Transactions on Information Forensics and Security (TIFS) (CCF-A)
Guang Yan, Yuhui Zhang*, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang , Dan Meng, Rui Hou*
2025 IEEE Symposium on Security and Privacy (S&P) (CCF-A)
Wenhao Wang , Linke Song , Benshan Mei , Shuang Liu, Shijun Zhao, Shoumeng Yan*, XiaoFeng Wang, Dan Meng, Rui Hou*
Network and Distributed System Security Symposium (NDSS) 2025 (CCF-A)
Haopeng Fan , Hailong Zhang*, Yongjuan Wang*, Wenhao Wang , Yanbei Zhu, Haojin Zhang, Qingjun Yuan
IEEE Transactions on Information Forensics and Security (TIFS) (CCF-A)
Xin Zhang, Zhi Zhang, Qingni Shen, Wenhao Wang , Yansong Gao, Zhuoxi Yang, Zhonghai Wu
The 61st Design Automation Conference (DAC 2024) (CCF-A)
Haopeng Fan , Wenhao Wang* , Yongjuan Wang, Xiangbin Wang, Yang Gao
Journal of Computer Security (JCS) (CCF-B)
Qingxiu Liu, Qun Huang*, Xiang Chen, Sa Wang, Wenhao Wang , Shujie Han, Patrick P. C. Lee
40th IEEE International Conference on Data Engineering (ICDE 2024) (CCF-A)
Zhenyang Dai, Shuang Liu, Vilhelm Sjoberg*, Xupeng Li, Yu Chen, Wenhao Wang , Yuekai Jia, Sean Noble Anderson, Laila Elbeheiry, Shubham Sondhi, Yu Zhang, Zhaozhong Ni, Shoumeng Yan*, Ronghui Gu, Zhengyu He
International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2024) (CCF-A)
[Xin Zhang, Zhi Zhang], Qingni Shen*, Wenhao Wang , Yansong Gao, Zhuoxi Yang, Jiliang Zhang
30th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2024) (CCF-A)
Zihao Wang , Di Tang*, XiaoFeng Wang, Wei He , Zhaoyang Geng , Wenhao Wang*
USENIX Security 2024 (CCF-A)
[Zihao Wang , Jiale Guan], XiaoFeng Wang, Wenhao Wang , Luyi Xing, Fares Alharbi
ACM Conference on Computer and Communications Security (ACM CCS 2023) (CCF-A)
[Wei He , Zhi Zhang], Yueqiang Cheng, Wenhao Wang* , Wei Song, Yansong Gao, Qifei Zhang, Kang Li, Dongxi Liu, Surya Nepal
IEEE Transactions on Computers (TC) (CCF-A)
[Zhi Zhang, Wei He ], Yueqiang Cheng, Wenhao Wang , Yansong Gao*, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou
IEEE Transactions on Dependable and Secure Computing (TDSC) (CCF-A)
Yuekai Jia, Shuang Liu, Wenhao Wang* , Yu Chen, Zhengde Zhai, Shoumeng Yan, Zhengyu He
2022 USENIX Annual Technical Conference (USENIX ATC) (CCF-A)
[Zhi Zhang, Yueqiang Cheng], Minghua Wang, Wei He , Wenhao Wang* , Nepal Surya, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu
2022 USENIX Annual Technical Conference (USENIX ATC) (CCF-A)
Wenhao Wang* , Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, Dongdai Lin
IEEE Transactions on Dependable and Secure Computing (TDSC) (CCF-A)
[Zhi Zhang, Wei He ], Yueqiang Cheng, Wenhao Wang , Yansong Gao*, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang
IEEE Transactions on Information Forensics and Security (TIFS) (CCF-A)
Weijie Liu, Wenhao Wang* , Hongbo Chen, XiaoFeng Wang*, Yaosong Lu, Kai Chen, Xinyu Wang, Qingtao Shen, Yi Chen, Haixu Tang
51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021) (CCF-B)
Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang , Peng Liu
2021 IEEE Symposium on Security and Privacy (S&P) (CCF-A)
Jianping Zhu, Rui Hou*, XiaoFeng Wang*, Wenhao Wang , Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang, Dan Meng
2020 IEEE Symposium on Security and Privacy (S&P) (CCF-A)
Tianlin Huo, Xiaoni Meng, Wenhao Wang* , Chunliang Hao, Pei Zhao, Jian Zhai, Mingshu Li*
IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES 2020) (CCF-B)
Zhe Zhou, Di Tang, Wenhao Wang , XiaoFeng Wang, Zhou Li, Kehuan Zhang
Annual Computer Security Applications Conference (ACSAC 2018) (CCF-B)
Meicheng Liu, Jingchun Yang, Wenhao Wang , Dongdai Lin
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt 2018) (CCF-A)
[Guoxing Chen, Wenhao Wang* ], Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin
2018 IEEE Symposium on Security and Privacy (S&P) (CCF-A)
XiaoFeng Wang, Haixu Tang, Shuang Wang, Xiaoqian Jiang, Wenhao Wang , Diyue Bu, Lei Wang, Yicheng Jiang, Chenghong Wang
2018 BMC Medical Genomics
Wenhao Wang , Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
ACM Conference on Computer and Communications Security (ACM CCS 2017) (CCF-A)
Shuai Wang, Wenhao Wang , Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu
2nd Workshop on Forming an Ecosystem Around Software Transformation, co-located with CCS 2017
Manuscripts
0
1
2
3
4
[Linke Song , Zixuan Pang], Wenhao Wang *, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou
Arxiv
Xiangyi Xu, Wenhao Wang *, Yongzheng Wu, Chenyu Wang, Huifeng Zhu, Haocheng Ma, Zhennan Min , Zixuan Pang, Rui Hou, Yier Jin*
Arxiv
[Weijie Liu, Hongbo Chen], XiaoFeng Wang, Zhi Li, Danfeng Zhang, Wenhao Wang , Haixu Tang
Arxiv
Wenhao Wang , Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, XiaoFeng Wang, Haixu Tang, Kai Chen, Kristin Lauter, Dongdai Lin
Arxiv
Courses
Paper Readings (2019-Spring, 20 hours)
Security Chips (2021-FALL, 2022-FALL, 40 hours)
Chip and Processor Security (2023-FALL, 40 hours, with Prof. Mingzhe Zhang )
Paper Readings (2024-Spring, 30 hours, with Prof. Ben Niu ). Here are some tips for paper reading and writing
Chip and Processor Security (2024-FALL, 2025-FALL, 40 hours)
Professional Services
Reviewer for journals IEEE TDSC , IEEE Security & Privacy , IEEE TC , ACM Transactions on Privacy and Security , CyberSecurity , SCN , JNCA .
Sub-reviewer for CCS (2018, 2020), NDSS (2017, 2018, 2021), S&P (2017, 2020, 2021), Usenix Security (2017, 2018, 2021), HPCA (2019), ESORICS (2018, 2020), Asiacrypt (2020), AsiaCCS (2017, 2018, 2019) and RECOMB (2019) etc.
TPC member for ACM CCS 2019 , GenoPri 2020 , SECURWARE 2022 , ACNS 2023 .
General Chair for Inscrypt 2022 .
Awards
2018 ACM SIGSAC China Rising Star Award, and ACM China Rising Star Nomination Award
2017 Young Star Award of Institute of Information Engineering, CAS
Students
Master students:
Yifan Bai
Xinhong Liu
Saisai Xia
PhD students:
Linke Song (Co-advised with Prof. Wei Song )
Alumni
Zhennan Min
Huihao Zhang
Jinze She
Wei He (in pursuit of a Doctoral Degree with Prof. Wei Song )
Wenwen Ruan (First job: Intel)
Sitong Chen (First job: Shanghai Academy of Spaceflight Technology)
Bohan Li (Co-advised with Prof. Dongdai Lin)
Zihao Wang (Co-advised with Prof. XiaoFeng Wang)
Zhaoyang Geng
Benshan Mei (Co-advised with Prof. Dongdai Lin)
Haopeng Fan (visiting student from Henan Key Laboratory of Network Cryptography Technology)
Useful Links
Last updated: Aug. 2025.
Powered by Jekyll and Minimal Light theme. Unique visitors: