Zhi Wang

Assistant Professor
Office: 172 LOVE Bldg
Department of Computer Science
Florida State University
Tallahassee, FL 32306

Email:
Phone: (850)645-0476

Here is my GnuPG key
Key ID: 9C48 0B63 F19A 450E
Fingerprint: 07CA F64E 16BF 2EB2 F264 78B4 9C48 0B63 F19A 450E

I am an assistant professor in the Department of Computer Science at the Florida State University. I have broad research interests in security with a focus on the systems security, particularly, operating systems security, virtualization security, and mobile security.

I am looking for self-motivated students with solid systems (e.g., virtualization, operating systems, or compiler) and security backgrounds. If you are interested in pursuing a Ph.D. with me, please send me an email with your CV.

Teaching

Fall 2014: CNT4406/CNT5412 Network Security

Spring 2014: COP4610: Introduction to Operating Systems ( Port of MIT Xv6 to the ARM architecture)

Fall 2013: CNT4406/CNT5412 Network Security

Spring 2013: COP4610/CGS5765: Introduction to Operating Systems

Fall 2012: CNT4406/CNT5412: Network Security

Publications

ARMlock: Hardware-based Fault Isolation for ARM
Yajin Zhou, Xiaoguang Wang, Yue Chen, Zhi Wang
Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS 2014)
Scottsdale, Arizona, November 2014 (19%) [to appear]
Systematic Audit of Third-Party Android Phones
Michael Mitchell, Guanyu Tian, Zhi Wang
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014)
San Antonio, TX, March 2014 (16%) [PDF, Slides]
DIVILAR: Diversifying Intermediate Language for Anti-Repackaging on Android Platform
Wu Zhou, Zhi Wang, Yajin Zhou, Xuxian Jiang
Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014)
San Antonio, TX, March 2014 (16%) [PDF]
Taming Hosted Hypervisors with (Mostly) Deprivileged Execution
Chiachih Wu, Zhi Wang, Xuxian Jiang
Proceedings of the 20th Network and Distributed System Security Symposium (NDSS 2013)
San Diego, CA, February 2013 (19%) [PDF]
Isolating Commodity Hosted Hypervisors with HyperLock
Zhi Wang, Chiachih Wu, Michael Grace, Xuxian Jiang
Proceedings of the 7th ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2012)
Bern Switzerland, April 2012 (15%) [PDF]
Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets
Yajin Zhou, Zhi Wang, Wu Zhou, Xuxian Jiang
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012)
San Diego, CA, February 2012 (18%) [PDF]
Systematic Detection of Capability Leaks in Stock Android Smartphones
Michael Grace, Yajin Zhou, Zhi Wang, Xuxian Jiang
Proceedings of the 19th Network and Distributed System Security Symposium (NDSS 2012)
San Diego, CA, February 2012 (18%) [PDF]
Process Out-Grafting: An Efficient `Out-of-VM' Approach for Fine-Grained Process Execution Monitoring
Deepa Srinivasan, Zhi Wang, Xuxian Jiang, Dongyan Xu
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011)
Chicago, Il, October 2011 (14%) [PDF]
Comprehensive and Efficient Protection of Kernel Control Data
Jinku Li, Zhi Wang, Tyler Bletsch, Deepa Srinivasan, Michael Grace, Xuxian Jiang
IEEE Transactions on Information Forensics and Security, 6(2), June 2011
HyperSentry: Enabling Stealthy In-context Measurement of Hypervisor Integrity
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, Xiaolan Zhang, Nathan C. Skalsky
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010)
Chicago, Il, October 2010 (17%) [PDF]
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu
Proceedings of the 29th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010)
New Delhi, India, October 2010 (23%) [PDF]
Transparent Protection of Commodity OS Kernels using Hardware Virtualization
Michael Grace, Zhi Wang, Deepa Srinivasan, Jinku Li, Xuxian Jiang, Zhengkai Liang, Siarhei Liakh
Proceedings of the 6th International Conference on Security and Privacy in Communication Networks (SecureComm 2010)
Singapore, September 2010 (25%) [PDF]
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
Zhi Wang, Xuxian Jiang
Proceedings of the 31st IEEE Symposium on Security & Privacy (Oakland 2010)
Oakland, CA, May 2010 (11%) [PDF, Slides]

Media coverage: Slashdot, iTnews, ZDNet UK, Computer World, UK, Network World, Dark Reading, Threatpost, Science Daily...
Defeating Return-Oriented Rootkits with `Return-less' Kernels
Jinku Li*, Zhi Wang*, Xuxian Jiang, Mike Grace, Sina Bahram
Proceedings of the 5th ACM SIGOPS/EuroSys European Conference on Computer Systems (EuroSys 2010)
Paris, France, April 2010 (19%) [PDF]
[*The names of the first two authors are in alphabetical order]
Countering Kernel Rootkits with Lightweight Hook Protection
Zhi Wang, Xuxian Jiang, Weidong Cui, and Peng Ning
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009)
Chicago, IL, November 2009 (18%) [PDF]

Media coverage: Slashdot The Register Bruce Schneier Ars Technica The Inquirer Dark Reading Science Daily...
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace
Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009)
Saint Malo, France, September 2009 (19%) [PDF]
Countering Persistent Kernel Rootkits Through Systematic Hook Discovery
Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang
Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008)
Boston, MA, September 2008 (25%) [PDF]

Professional Services

TPC Member



Last updated: Jan 5th, 2014