Assistant Professor
School of Computing
Florida Institute of Technology
150 West University Blvd.
Melbourne, Florida 32901-6975
Email: zhangs at cs.fit.edu
Office: 317 Harris Center for Science and Engineering
Phone: (321)674-7055
Biography
Dr. Shengzhi Zhang is an Assistant Professor in Computer Science, at Florida Institute of Technology. He received
his Ph.D. from the Department of Computer Science and Engineering, The Pennsylvania State University in 2012,
and his B.E. from the Department of Electrical Engineering and Automation, Tongji University China in 2006.
Dr. Zhang's research interest includes, but not limited to IoT security, system security, mobile security and vehicle security.
Teaching
Spring 2018: CSE2120 Computer Organization and Machine Programming
Spring 2018: CYB5285 Secure Operating Systems
Fall 2017: CSE2120 Computer Organization and Machine Programming
Fall 2017: CYB5280 Host and Application Security
Spring 2017: CSE2120 Computer Organization and Machine Programming
Spring 2017: CYB5285 Secure Operating Systems
Fall 2016: CSE2120 Computer Organization and Machine Programming
Fall 2016: CYB5280 Host and Application Security
Spring 2016: CYB5285 Secure Operating Systems
Fall 2015: CYB5280 Host and Application Security
Fall 2015: CYB5272 Computer and Information Security
Spring 2015: CYB5285 Secure Operating Systems
Fall 2014: CSE5800 Advanced topics on Mobile Security
Fall 2014: CYB5272 Computer and Information Security
Spring 2014: CYB5285 Secure Operating Systems
Students
Yuxuan Chen (Ph.D student)
Yihua Xu (Master Student)
Maksym Hryhorenko (Master Student)
Sultan Aldossary (Ph.D, 2017, co-advised with Dr. Allen)
Jun Qiu (Master 2016)
Ayush shah (Master 2015)
Publication
2018
CommanderSong: A Systematic Approach for Practical Adversarial Voice Recognition
Xuejing Yuan, Yuxuan Chen, Yue Zhao, Yunhui Long, Kai Chen, Shengzhi Zhang, Heqing Huang, Xiaofeng Wang
Accepted by USENIX Security '18
A Security Model for Dependable Vehicle Middleware and Mobile Application Connection
Shengzhi Zhang, Omar Makke, Oleg Gusikhin, Ayush Shah, Athanasios Vasilakos
The 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS '18)
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM
Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger
IEEE Transactions on Dependable and Secure Computing, accept with major revision
2017
Towards Comprehensive Protection for OpenFlow Controllers
Shengzhi Zhang, Xiaoqi Jia, Weijuan Zhang
The 19th The Asia-Pacific Network Operations and Management Symposium (APNOMS '17), best paper award
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger
The 15th ACM International Conference on Mobile Systems, Applications, and Services (Mobisys '17)
2016
Towards service continuity for transactional applications via diverse device drivers
Shengzhi Zhang, Xiaoqi Jia and Peng Liu
The International Journal of Information and Computer Security 8(4), 382-400 (2016)
A Comprehensive Study of Co-residence Threat in Multi-tenant Public PaaS Clouds
Weijuan Zhang, Xiaoqi Jia, Chang Wang, Shengzhi Zhang, Qingjia Huang, Mingsheng Wang, Peng Liu
The 18th IEEE International Conference on Information and Communications Security (ICICS '16), 2016
Classifying Android Malware with Dynamic Behavior Dependency Graphs
Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang and Chuankun Wu
The 15th IEEE International Conference on Trust, Security and
Privacy in Computing and Communications (TRUSTCOM 2016)
Analyzing Android Repackaged Malware by Decoupling Their Event Behaviors
Zimin Lin, Rui Wang, Xiaoqi Jia, Shengzhi Zhang, and Chuankun Wu
International Workshop on Security (IWSEC 2016), award paper
2015
A Study of Network Domains Used in Android Applications
Mark Fioravanti, Ayush Shah and Shengzhi Zhang
The 9th International Conference on Network and System Security (NSS 2015)
Comprehensive Analysis of the Google Play's Auto-Update Policy
Craig Sanders, Ayush Shah and Shengzhi Zhang
The 11th International Conference on Information Security Practice and Experience (ISPEC 2015)
2014
Machine Learning based Cross-site Scripting Detection in Online Social Network
Rui Wang, Xiaoqi Jia, Qinlei Li, Shengzhi Zhang
The 6th International Symposium on Cyberspace Safety and Security (CSS '14), Paris, France, 2014
2013
Towards transparent and distributed workload management for large scale web servers
Shengzhi Zhang, Wenjie Wang, Haishan Wu, Athanasios V. Vasilakos, Peng Liu
Future Generation Comp. Syst. 29(4): 913-925 (2013)
Defending return-oriented programming based on virtualization techniques
Xiaoqi Jia, Rui Wang, Jun Jiang, Shengzhi Zhang, Peng Liu
Security and Communication Networks 6(10): 1236-1249 (2013)
2012
Assessing the Trustworthiness of Drivers
Shengzhi Zhang, Peng Liu
Research in Attacks, Intrusions, and Defenses (RAID '12), Amsterdam, The Netherlands, 2012
Letting applications operate through attacks launched from compromised drivers
Shengzhi Zhang, Peng Liu
The 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS '12), Seoul, South Korea, 2012
Hidden node collision recovery protocol for low rate wireless personal area networks
Shengzhi Zhang, Sang-Jo Yoo
Wireless Communications and Mobile Computing 12(15): 1351-1362 (2012)
2011
PEDA: Comprehensive Damage Assessment for Production Environment Server Systems
Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing
IEEE Transactions on Information Forensics and Security 6(4): 1323-1334 (2011)
LeakProber: a framework for profiling sensitive data leakage paths
Junfeng Yu, Shengzhi Zhang, Peng Liu, Zhitang Li
The first ACM conference on Data and application security and privacy (CODASPY '11), San Antonio, TX, USA, 2011
Distributed workload and response time management for web applications
Shengzhi Zhang, Haishan Wu, Wenjie Wang, Bo Yang, Peng Liu, Athanasios V. Vasilakos
The 7th International Conference on Network and Services Management (CNSM '11), Paris, France, 2011
HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
Jun Jiang, Xiaoqi Jia, Dengguo Feng, Shengzhi Zhang, Peng Liu
The 13th International Conference on Information and Communications Security (ICICS '11), Beijing, China, 2011
2010
Cross-layer comprehensive intrusion harm analysis for production workload server systems
Shengzhi Zhang, Xiaoqi Jia, Peng Liu, Jiwu Jing
The 26th Annual Computer Security Applications Conference (ACSAC '10), Austin, Texas, USA, 2010
Cross-Layer Damage Assessment for Cyber Situational Awareness
Peng Liu, Xiaoqi Jia, Shengzhi Zhang, Xi Xiong, Yoon-chan Jhi, Kun Bai, Jason H. Li
Cyber Situational Awareness 2010: 155-176
Challenges in Improving the Survivability of Data Centers
Shengzhi Zhang, Xi Xiong, Peng Liu
Workshop on Survivability in Cyberspace, Stockholm, Sweden, 2010
Rupi's Dance: Cross-Layer Comprehensive Infection Diagnosis for Availability-Critical Server Systems
Shengzhi Zhang, Xiaoqi Jia, Peng Liu
The 5th ACM SIGOPS EuroSys Conference (Eurosys '10), Paris, France, 2010 (poster)
Before 2010
Availability-Sensitive Intrusion Recovery
Shengzhi Zhang, Xi Xiong, Xiaoqi Jia, Peng Liu
The 2nd ACM workshop on Virtual machine security (VMSec '09), Chicago, IL, USA, 2009
Using virtual machines to do cross-layer damage assessment
Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu
The 1st ACM workshop on Virtual machine security (VMSec '08), Fairfax, VA, USA, 2008
Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANs
Shengzhi Zhang, Sang-Jo Yoo
The 7th IEEE International Conference on Computer and Information Technology (CIT '07), Fukushima Japan, 2007
Professional Services
Editor in Chief
Journal of Secure Communication and System
Journal Reviewer
IEEE Transactions on Parallel and Distributed Systems
IEEE Transactions on Dependable and Secure Computing
IEEE Transactions on Network and Service Management
IEEE Transactions on Cloud Computing
EAI Transactions on Security and Safety
Wiley Security and Communication Networks
IEEE Communications Letters
Journal of Computer Engineering and Information Technology
Springer Knowledge and Information Systems
IET Information Security
Conference Program Committee
IFIP International Information Security and Privacy Conference (IFIP SEC '17)
10th International Conference on Security and Privacy in Communication Networks (SecureComm '14)
The Tenth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '16)
29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec) 2015, 2016, 2017
Working Conference on Data and Applications Security and Privacy
Advanced Intrusion Detection and Prevention Workshop (AIDP'14), in conjunction with the 29th IFIP TC-11 SEC 2014
IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) 2014, 2015
The seventh International Workshop on Autonomous and Spontaneous Security (SETOP '14), co-located with ESORICS 2014