Selected Publications
[DAC 2026] SLCross: Cross-Component System-Level Cache Side-Channel Attacks on Apple M2 SoC
Yakun Wu, Guanlong Wu, Yusi Feng, Yinqian Zhang
Design Automation Conference (CCF-A / CORE-A)[TDSC 2025] Hypnos: A Practical Power Side-Channel Attack via CPU Idle Time
Yusi Feng, Xin Zhang, Zihui Guo, Ben Liu, Fei Wang, Ziyuan Zhu, Yinqian Zhang
IEEE Transactions on Dependable and Secure Computing (CCF-A, IF=7.5)(Short paper)[TDSC 2025] Fish and Chips: On the Root Causes of Co-located Website-Fingerprinting Attacks
Yusi Feng, Sioli O’Connel, Xin Zhang, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Yinqian Zhang, Zhi Zhang
IEEE Transactions on Dependable and Secure Computing (CCF-A, IF=7.5)[TCAD 2025] MUXLeak: Exploiting Multiplexers as A Power Side Channel against Multi-tenant FPGAs [paper] [code]
Xin Zhang, Jiajun Zou, Zhi Zhang, Qingni Shen, Yansong Gao, Jinhua Cui, Yusi Feng, Zhonghai Wu, Derek Abbott
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (CCF-A, IF=2.9)[AsiaCCS 2024] SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters
William Kosasih, Yusi Feng, Chitchanok Chuengsatiansup, Yuval Yarom, Ziyuan Zhu
ACM ASIA Conference on Computer and Communications Security (CCF-C / CORE-A)[TrustCom 2021] Constant-Time Loading: Modifying CPU Pipeline to Defeat Cache Side-Channel Attacks
Yusi Feng, Ziyuan Zhu, Shuan Li, Ben Liu, Huozhu Wang, Dan Meng
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (CCF-C / CORE-B)[IJCNN 2021] An Effective Approach for Malware Detection and Explanation via Deep Learning Analysis
Huozhu Wang, Ziyuan Zhu, Zhongkai Tong, Xiang Yin, Yusi Feng, Gang Shi, Dan Meng.
International Joint Conference on Neural Networks (CCF-C / CORE-B)
