Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

portfolio

publications

TEESlice: Slicing DNN Models for Secure and Efficient Deployment inside TEEs

Published in AISTA Workshop @ ISSTA 2022, 2022

Introduces TEESlice for slicing DNN models to enable secure and efficient deployment inside Trusted Execution Environments.

Recommended citation: Ziqi Zhang, Lucien K. L. Ng, Yifeng Cai, Yao Guo, Bingyan Liu, Ding Li, and Xiangqun Chen. TEESlice: Slicing DNN Models for Secure and Efficient Deployment inside TEEs. AISTA Workshop @ ISSTA 2022.

SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution

Published in CCS 2023, 2023

Uses static symbolic execution to detect cross-boundary pointer vulnerabilities in SGX applications.

Recommended citation: Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li, Yao Guo, and Xiangqun Chen. SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. CCS 2023. https://dl.acm.org/doi/10.1145/3576915.3616639

No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition Defenses

Published in IEEE S&P 2024, 2024

Analyzes the security limits of TEE-shielded DNN partition defenses for on-device ML.

Recommended citation: Ziqi Zhang, Chen Gong, Yuanyuan Yuan, Yifeng Cai, Bingyan Liu, Ding Li, Yao Guo, and Xiangqun Chen. No Privacy Left Outside: On the (In-)Security of TEE-Shielded DNN Partition Defenses. IEEE S&P 2024. https://www.computer.org/csdl/proceedings-article/sp/2024/313000a052/1RjEarlPFew

FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive Learning

Published in USENIX Security 2024, 2024

Proposes robust privacy-preserving authentication for payment apps using federated multi-modal contrastive learning.

Recommended citation: Yifeng Cai, Ziqi Zhang, Jiaping Gui, Bingyan Liu, Xiaoke Zhao, Ruoyu Li, Zhe Li, and Ding Li. FAMOS: Robust Privacy-Preserving Authentication on Payment Apps via Federated Multi-Modal Contrastive Learning. USENIX Security 2024. https://www.usenix.org/conference/usenixsecurity24/presentation/cai-yifeng

Interference-free Operating System: A 6 Years’ Experience in Mitigating Cross-Core Interference in Linux

Published in RTSS 2024, 2024

Reports six years of experience mitigating cross-core interference in Linux for real-time systems.

Recommended citation: Zhaomeng Deng, Ziqi Zhang, Yao Guo, Yunfeng Ye, Yuxin Ren, Ning Jia, Xinwei Hu, and Ding Li. Interference-free Operating System: A 6 Years' Experience in Mitigating Cross-Core Interference in Linux. RTSS 2024. https://ieeexplore.ieee.org/document/10815640

TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models

Published in ACM TOSEM 2025, 2025

Studies secure model protection in TEEs when adversaries also hold strong pre-trained models.

Recommended citation: Ding Li, Ziqi Zhang, Mengyu Yao, Yifeng Cai, Yao Guo, and Xiangqun Chen. TEESlice: Protecting Sensitive Neural Network Models in Trusted Execution Environments When Attackers have Pre-Trained Models. ACM TOSEM 2025. https://dl.acm.org/doi/10.1145/3707453

Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms

Published in USENIX Security 2025, 2025

Evaluates the security of weight-obfuscation-based protection in TEE-shielded LLM partition algorithms.

Recommended citation: Pengli Wang, Bingyou Dong, Yifeng Cai, Zheng Zhang, Junlin Liu, Huanran Xue, Ye Wu, Yao Zhang, and Ziqi Zhang. Game of Arrows: On the (In-)Security of Weight Obfuscation for On-Device TEE-Shielded LLM Partition Algorithms. USENIX Security 2025. https://ziqi-zhang.github.io/files/SEC25-GameOfArrows.pdf

I Can Tell Your Secrets: Inferring Privacy Attributes from Mini-app Interaction History in Super-apps

Published in USENIX Security 2025, 2025

Reveals how privacy attributes can be inferred from mini-app interaction histories in super-apps.

Recommended citation: Yifeng Cai, Ziqi Zhang, Mengyu Yao, Junlin Liu, Xiaoke Zhao, Xinyi Fu, Ruoyu Li, Zhe Li, Ding Li, Yao Guo, and Xiangqun Chen. I Can Tell Your Secrets: Inferring Privacy Attributes from Mini-app Interaction History in Super-apps. USENIX Security 2025.

Membership and Memorization in LLM Knowledge Distillation

Published in EMNLP 2025, 2025

Investigates membership inference and memorization risks that arise during LLM knowledge distillation.

Recommended citation: Ziqi Zhang, Ali Shahin Shamsabadi, Hanxiao Lu, Yifeng Cai, and Hamed Haddadi. Membership and Memorization in LLM Knowledge Distillation. EMNLP 2025.

AegisGuard: RL-Guided Adapter Tuning for TEE-Based Efficient Secure On-Device Inference

Published in NeurIPS 2025, 2025

Uses reinforcement learning-guided adapter tuning for efficient and secure on-device inference inside TEEs.

Recommended citation: Che Wang, Ziqi Zhang, Yinggui Wang, Tiantong Wang, Yurong Hao, Jianbo Gao, Tao Wei, Yang Cao, Zhong Chen, and Wei Yang Bryan Lim. AegisGuard: RL-Guided Adapter Tuning for TEE-Based Efficient Secure On-Device Inference. NeurIPS 2025.

talks

teaching