Dr. Wenhao Wang is an associate professor at Institute of Information Engineering (IIE), CAS. His research interests now focus on protecting user privacy data with the help of hardware features, such as Intel SGX, as well as cryptographic techniques (e.g., homomorphic encryption). Ongoing projects also include designing new hardware based TEEs (trusted execution environments) to support large scale data processing. Dr. Wenhao Wang was a visiting scholar of Prof. XiaoFeng Wang’s group in Indiana University Bloomington from April 2016 to August 2018, during which he worked closely with Prof. Wang and Prof. Haixu Tang in organizing the Genomic data privacy and security protection competition. Please find the cv here: in English, 中文.
Please send an email to wangwenhao@iie.ac.cn if you would like to join the group. Students with interests in topics related to operating system/software/virtualization/hardware-assisted security/TEE/privacy preserving technologies/microarchitectural side channels etc., are all welcome.
News: A new paper on rowhammer attacks on gray-box DNNs is accepted to USENIX Security 2024.
News: A new paper on iOS side channel analysis is accepted to ACM CCS 2023.
Publications (
Corresponding authors, [ ] Equal Contributions, ~ Advised by me)
- Tossing in the Dark: Practical Bit-Flipping on Gray-box Deep Neural Networks for Runtime Trojan Injection
Zihao Wang, Di Tang, XiaoFeng Wang, Wei He, Zhaoyang Geng, Wenhao Wang
USENIX Security 2024 (CCF-A) - The Danger of Minimum Exposures: Understanding Cross-App Information Leaks on iOS through Multi-Side-Channel Learning
[Zihao Wang, Jiale Guan], XiaoFeng Wang, Wenhao Wang, Luyi Xing, Fares Alharbi
ACM Conference on Computer and Communications Security (ACM CCS 2023) (CCF-A) - WhistleBlower: A System-level Empirical Study on RowHammer
[Wei He, Zhi Zhang], Yueqiang Cheng, Wenhao Wang, Wei Song, Yansong Gao, Qifei Zhang, Kang Li, Dongxi Liu, Surya Nepal
IEEE Transactions on Computers (TC) (CCF-A) - Implicit Hammer: Cross-Privilege-Boundary Rowhammer through Implicit Accesses
[Zhi Zhang, Wei He], Yueqiang Cheng, Wenhao Wang, Yansong Gao, Dongxi Liu, Kang Li, Surya Nepal, Anmin Fu, Yi Zou
IEEE Transactions on Dependable and Secure Computing (TDSC) (CCF-A) - HyperEnclave: An Open and Cross-platform Trusted Execution Environment [slides]
Yuekai Jia, Shuang Liu, Wenhao Wang, Yu Chen, Zhengde Zhai, Shoumeng Yan, Zhengyu He
2022 USENIX Annual Technical Conference (USENIX ATC) (CCF-A) - SoftTRR: Protect Page Tables Against RowHammer Attacks using Software-only Target Row Refresh [slides]
[Zhi Zhang, Yueqiang Cheng], Minghua Wang, Wei He, Wenhao Wang, Nepal Surya, Yansong Gao, Kang Li, Zhe Wang, Chenggang Wu
2022 USENIX Annual Technical Conference (USENIX ATC) (CCF-A) - Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave Services
Wenhao Wang, Weijie Liu, Hongbo Chen, XiaoFeng Wang, Hongliang Tian, Dongdai Lin
IEEE Transactions on Dependable and Secure Computing (TDSC) (CCF-A) - BitMine: An End-to-End Tool for Detecting Rowhammer Vulnerability
[Zhi Zhang, Wei He], Yueqiang Cheng, Wenhao Wang , Yansong Gao, Minghua Wang, Kang Li, Surya Nepal, Yang Xiang
IEEE Transactions on Information Forensics & Security (TIFS) (CCF-A) - Practical and Efficient in-Enclave Verification of Privacy Compliance [slides]
Weijie Liu, Wenhao Wang, Hongbo Chen, XiaoFeng Wang
, Yaosong Lu, Kai Chen, Xinyu Wang, Qingtao Shen, Yi Chen, Haixu Tang
51st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021) (CCF-B) - Randomized Last-Level Caches Are Still Vulnerable to Cache Side-Channel Attacks! But We Can Fix It
Wei Song, Boya Li, Zihan Xue, Zhenzhen Li, Wenhao Wang, Peng Liu
2021 IEEE Symposium on Security and Privacy (S&P) (CCF-A) - TEADS: A Defense-aware Framework for Synthesizing Transient Execution Attacks
Tianlin Huo, Wenhao Wang, Pei Zhao, Yufeng Li, Tingting Wang, Mingshu Li
IEEE TrustCom 2020 (CCF-C) - Partial-SMT: Core-scheduling Protection Against SMT Contention-based Attacks
Xiaohui Wu, Yeping He, Qiming Zhou, Hengtai Ma, Liang He, Wenhao Wang and Liheng Chen
IEEE TrustCom 2020 (CCF-C) - Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment
Jianping Zhu, Rui Hou, XiaoFeng Wang
, Wenhao Wang, Jiangfeng Cao, Boyan Zhao, Zhongpu Wang, Yuhui Zhang, Jiameng Ying, Lixin Zhang and Dan Meng
2020 IEEE Symposium on Security and Privacy (S&P) (CCF-A) - Bluethunder: A 2-level Directional Predictor Based Side-Channel Attack against SGX
Tianlin Huo, Xiaoni Meng, Wenhao Wang, Chunliang Hao, Pei Zhao, Jian Zhai, Mingshu Li
IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES’2020) (CCF-B) - Beware of Your Screen: Anonymous Fingerprinting of Device Screens for Off-line Payment Protection
Zhe Zhou, Di Tang, Wenhao Wang, XiaoFeng Wang, Zhou Li, Kehuan Zhang
Annual Computer Security Applications Conference (ACSAC’2018) (CCF-B) - Symbolic-Like Computation and Conditional Differential Cryptanalysis of QUARK
Jingchun Yang, Meicheng Liu, Dongdai Lin and Wenhao Wang
13th International Workshop on Security (IWSEC’2018) (CCF-C) - Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery
Meicheng Liu, Jingchun Yang, Wenhao Wang, Dongdai Lin
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Eurocrypt’2018) (acceptance rate: 23%, CCF-A) - Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
[Guoxing Chen, Wenhao Wang], Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin.
2018 IEEE Symposium on Security and Privacy (S&P) (acceptance rate: ~10%, CCF-A) - iDASH secure genome analysis competition 2017
XiaoFeng Wang, Haixu Tang, Shuang Wang, Xiaoqian Jiang, Wenhao Wang, Diyue Bu, Lei Wang, Yicheng Jiang, Chenghong Wang
BMC Medical Genomics 2018 - Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX [slides]
Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter.
ACM CCS 2017 (acceptance rate: 18%, CCF-A) - Binary Code Retrofitting and Hardening Using SGX [slides]
Shuai Wang, Wenhao Wang, Qinkun Bao, Pei Wang, XiaoFeng Wang, Dinghao Wu
2nd Workshop on Forming an Ecosystem Around Software Transformation, 2017, co-located with CCS 2017. - Searching Cubes for Testing Boolean Functions and Its Application to Trivium
Meicheng Liu, Dongdai Lin, Wenhao Wang
2015 IEEE International Symposium on Information Theory. (IIE-B) - Comments on “A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation”
Wenhao Wang, Meicheng Liu, Yin Zhang
Cryptography and Communications - Analysis of Multiple Checkpoints in Non-perfect and Perfect Rainbow Tradeoff Revisited
Wenhao Wang, Dongdai Lin
ICICS’13 (acceptance rate: 20%, CCF-C) - Improvement and Analysis of VDP Method in Time/Memory Tradeoff Applications
Wenhao Wang, Dongdai Lin, Zhenqi Li, Tianze Wang
ICICS’11 (acceptance rate: 23%, CCF-C)
Manuscript(s)
- Toward Scalable Fully Homomorphic Encryption Through Light Trusted Computing Assistance
Wenhao Wang, Yichen Jiang, Qintao Shen, Weihao Huang, Hao Chen, Shuang Wang, XiaoFeng Wang, Haixu Tang, Kai Chen and Kristin Lauter and Dongdai Lin - Understanding TEE Containers, Easy to Use? Hard to Trust
[Weijie Liu, Hongbo Chen], XiaoFeng Wang, Zhi Li, Danfeng Zhang, Wenhao Wang, Haixu Tang
Courses
- 芯片及处理器安全(40学时,with Prof. Mingzhe Zhang)
- 文献阅读(30学时,with Prof. Ben Niu)
Professional Services
- Reviewer for journals IEEE TDSC, IEEE Security & Privacy, IEEE TC, ACM Transactions on Privacy and Security, CyberSecurity, SCN, JNCA.
- Sub-reviewer for CCS (2018, 2020), NDSS (2017, 2018, 2021), S&P (2017, 2020, 2021), Usenix Security (2017, 2018, 2021), HPCA (2019), ESORICS (2018, 2020), Asiacrypt (2020), AsiaCCS (2017, 2018, 2019) and RECOMB (2019) etc.
- TPC member for ACM CCS 2019, GenoPri 2020, SECURWARE 2022, ACNS 2023.
- General Chair for Inscrypt 2022.
Awards
- 2018 ACM SIGSAC China Rising Star Award, and ACM China Rising Star Nomination Award
- 2017 Young Star Award of Institute of Information Engineering, CAS
Talks
- 看懂可信执行环境硬件设计 - 浅析TEE的内存加密和完整性保护机制 隐私计算联盟安全研讨会
- A breif introduction to scalable SGX
- 可信硬件与密码学的一些思考
- 硬件安全问题及防护
- Mitigating side channels in SGX with software only methods (in Chinese)
- Enabling Rack-scale Confidential Computing using Heterogeneous Trusted Execution Environment
- China Conference on Data Security and Privacy (ChinaPrivacy2019), Oct. 2019, Guilin, Confidential Computing, in Chinese
- Nankai University, July 2019, Tianjin, Confidential Computing, in Chinese
- Institute of Software, July 2019, Beijing
- ACM TURC 2019 (SIGSAC), May 2019, Chengdu, Side Channel Risks in Hardware Trusted Execution Environments (TEEs)
Students
- Master students:
- Wei He (in pursuit of a Doctoral Degree with Prof. Wei Song)
- Jinze She
- Zhaoyang Geng
- Zhennan Min
- Huihao Zhang
- Linke Song
- PhD students (unofficially advised by me):
- Benshan Mei
- Bohan Li
- Zihao Wang
Alumni
- Wenwen Ruan (First job: Intel)
- Sitong Chen (First job: Shanghai Academy of Spaceflight Technology)
Useful Links
- Top Cyber Security Conferences Ranking
- IACR Calendar of Events in Cryptology
- Influential Security Papers and Influential Crypto Papers
- UCL Crypto Group - Forthcoming calls for papers
- System Security Circus
- Security and Privacy Conference Deadlines
Last updated: 2023/9/22.