I got my Ph.D. from the Department of Computer Science at the University of North Carolina at
Chapel Hill in 2020, where I was fortunate to be working with Professor Michael Reiter. My PhD thesis focuses on applying advanced
information analysis technique to real software and hardware implementations. Before my PhD study, I obtained my
B.S. degree from Shanghai Jiao Tong University.
Professional Service
My current research interests are on System Security including confidential computing and formal verification.
- Oakland'24
- CCS'23 Cycle B
- EuroSP'23
- ISSRE'22
- CCS Poster'22, CCS poster'21
Program Committee |
|
- VeriSMo: A verified security module for confidential VMs
Z. Zhou, A. , W. Chen, S. Gong, C. Hawblitzel, W. Cui
In Proceeding of the 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI) , July 2024. (Best Paper Award. acceptance rate 15.6% = 44/282, presentation, code) - Core slicing: closing the gap between leaky confidential VMs and bare-metal cloud
Z. Zhou, Y. Shan, W. Cui, X. Ge, M. Peinado, A. Baumann
In Proceeding of the 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI) , July 2023. (acceptance rate 19.6% = 50/255, presentation, code ) - Interpretable Noninterference Measurement and its Application to Processor Designs
Z. Zhou and M. K. Reiter
In Proceeding of the 36th SIGPLAN International Conference on Object Oriented Programming Systems Languages & Applications (OOPSLA), November 2021. doi:10.1145/3485518 - Static evaluation of noninterference using approximate model counting
Z. Zhou, Z. Qian, M. K. Reiter, and Y. Zhang
In Proceedings of the 39th IEEE Symposium on Security and Privacy, pages 514–528, May 2018. doi:10.1109/SP.2018.00052
(acceptance rate 11.5% = 63/549, Talk) - A software approach to defeating side channels in last-level caches
Z. Zhou, M. K. Reiter, and Y. Zhang
In Proceedings of the 23rd ACM Conference on Computer and Communications Security, pages 871–882, October 2016. doi:10.1145/2976749.2978324
(acceptance rate 16.5% = 137/831, Talk) - Context-Centric Target Localization with Optimal Anchor Deployments
Q. Zhang and W. Xu and Z. Huang and Z. Zhou and P. Yi and T. Zhu and S. Xiao
In Proceedings of the 23rd IEEE International Conference on Network Protocols, pages 396–405, November 2015. doi:10.1109/ICNP.2015.14
(acceptance rate 20.5% = 39/190) - Fingerprint-free tracking with dynamic enhanced field division
Q. Zhang, Z. Zhou, W. Xu, J. Qi, C. Guo, P. Yi, T. Zhu, and S. Xiao
In Proceedings of the 34th IEEE Conference on Computer Communications, pages 2785–2793, April 2015. doi:10.1109/INFOCOM.2015.7218671
(acceptance rate 19.3% = 316/1,640) - EEP2P: An energy-efficient and economy-efficient P2P network protocol
Z. Zhou, M. Xie, T. Zhu, W. Xu, P. Yi, Z. Huang, Q. Zhang, and S. Xiao
In Proceedings of the 5th International Green Computing Conference, pages 1–6, November 2014. doi:10.1109/IGCC.2014.7039171 - A three-dimensional
wireless indoor localization system
P. Yi, M. Yu, Z. Zhou, W. Xu, Q. Zhang, and T. Zhu
Journal of Electrical and Computer Engineering, Jan 2014. doi:10.1155/2014/149016
Talks
- Interpretable
Noninterference Measurement and its Application to Processor
Designs
The 2nd Annual Workshop of the Side Channel Academic Programme, Online, Sep, 2020. - Static evaluation of noninterference using approximate model
counting
IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, May, 2018. - A software approach to defeating side channels in last-level caches
ACM Conference on Computer and Communications Security (CCS), Vienna, Austria, Oct., 2016.
Patents
- Protocol-independent anomaly detection
J. Rhee, L. Tang, Z. Chen, C. Kim, Z. Li, Z. Zhou, US Patent App. 16/535,521
- [2013] Shanghai Jiao Tong University Scholarship
Top 10% student - [2012] Tencent Innovation Scholarship
Highest funding for one of top %3 students - [2011] Shanghai Jiao Tong University Scholarship
Top 10% student