Posts by Collection

portfolio

publications

Emulating Samsung’s Baseband for Security Testing

Published in BlackHat USA, 2020

Grant Hernandez, Marius Muench, Tyler Tucker, Hunter Serle, Weidong Zhu, Patrick Traynor and Kevin Butler. Emulating Samsung’s Baseband for Security Testing. BlackHat USA, 2020.

HallMonitor: A Framework for Identifying Network Policy Violations in Software

Published in IEEE Conference on Communications and Network Security (CNS), 2022

Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin Butler and Patrick Traynor. HallMonitor: A Framework for Identifying Network Policy Violations in Software. In Proceedings of 2022 IEEE Conference on Communications and Network Security (CNS), 2022.

Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? (SK Hynix Best Paper Award)

Published in ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023

Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? In Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023.
Download Paper

Minding the Semantic Gap for Effective Storage-Based Ransomware Defense

Published in International Conference on Massive Storage Systems and Technology (MSST), 2024

Weidong Zhu, Grant Hernandez, Washington Garcia, Hunter Searle, Dave (Jing) Tian, Sara Rampazzi and Kevin Butler. Minding the Semantic Gap for Effective Storage-Based Ransomware Defense. In Proceedings of the 50th International Conference on Massive Storage Systems and Technology (MSST), 2024.
Download Paper

research

talks

teaching

CNT 4403 - Computing and Network Security

Undergraduate course, FIU, 2025

Fundamental concepts and principles of computing and network security, symmetric and asymmetric cryptography, hash functions, authentication, firewalls and intrusion detection, and operational issues. Prerequisites: CGS3767 Corequisite: CGS4285. Enrollment Requirements: Please Note: Fully Online Program students may not enroll in this class section. Prerequisites: CGS3767 Corequisite: CGS4285.

CIS 5374 - Security and Privacy: Attacks and Defenses

Graduate course, FIU, 2026

The course examines a broad range of cyber threats, including common attack types, threat models, and adversarial techniques, alongside defensive strategies and security mechanisms used to mitigate these risks. In parallel, the course explores key privacy issues in computing and information systems, including fair information practices, the tension between anonymity and privacy, privacy risks, tracking and surveillance technologies, and the tools, policies, and regulatory frameworks designed to protect personal data. Students will develop the ability to analyze security and privacy problems critically, evaluate technical and policy-based solutions, and reason about trade-offs between usability, security, and privacy in real-world systems. Prerequisite: M.S. or Ph.D. standing, or permission of the instructor.