Posts by Collection

portfolio

publications

Emulating Samsung’s Baseband for Security Testing

Published in BlackHat USA, 2020

Grant Hernandez, Marius Muench, Tyler Tucker, Hunter Serle, Weidong Zhu, Patrick Traynor and Kevin Butler. Emulating Samsung’s Baseband for Security Testing. BlackHat USA, 2020.

NASA: NVM-Assisted Secure Deletion for Flash Memory

Published in ACM SIGBED International Conference on Embedded Software (EMSOFT), 2022

Weidong Zhu and Kevin Butler. NASA: NVM-Assisted Secure Deletion for Flash Memory. In Proceedings of ACM SIGBED International Conference on Embedded Software (EMSOFT), 2022.

HallMonitor: A Framework for Identifying Network Policy Violations in Software

Published in IEEE Conference on Communications and Network Security (CNS), 2022

Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin Butler and Patrick Traynor. HallMonitor: A Framework for Identifying Network Policy Violations in Software. In Proceedings of 2022 IEEE Conference on Communications and Network Security (CNS), 2022.

Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? (SK Hynix Best Paper Award)

Published in ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023

Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? In Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023.

AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

Published in IEEE Symposium on Security and Privacy (S&P), 2024

Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. In Proceedings of 45th IEEE Symposium on Security and Privacy (S&P), 2024.

Minding the Semantic Gap for Effective Storage-Based Ransomware Defense

Published in International Conference on Massive Storage Systems and Technology (MSST), 2024

Weidong Zhu, Grant Hernandez, Washington Garcia, Hunter Searle, Dave (Jing) Tian, Sara Rampazzi and Kevin Butler. Minding the Semantic Gap for Effective Storage-Based Ransomware Defense. In Proceedings of the 50th International Conference on Massive Storage Systems and Technology (MSST), 2024.

RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces

Published in ACM Conference on Computer and Communications Security (CCS), 2024

Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, and Kevin Butler. RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2024.

Leveraging Storage Semantics to Enhance Data Security and Privacy

Published in ACM Conference on Computer and Communications Security (CCS), 2024

Weidong Zhu. Leveraging Storage Semantics to Enhance Data Security and Privacy. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Doctoral Symposium, 2024.

Enabling Plausible Deniability in Flash-based Storage through Data Permutation

Published in 41st Annual Computer Security Applications Conference (ACSAC), 2025

Weidong Zhu, Wenxuan Bao, Vincent Bindschaedler, Sara Rampazzi and Kevin R. B. Butler. Enabling Plausible Deniability in Flash-based Storage through Data Permutation. In Proceedings of 41st Annual Computer Security Applications Conference (ACSAC), 2025.

research

talks

teaching

CNT 4403 - Computing and Network Security

Undergraduate course, FIU, 2025

Fundamental concepts and principles of computing and network security, symmetric and asymmetric cryptography, hash functions, authentication, firewalls and intrusion detection, and operational issues. Prerequisites: CGS3767 Corequisite: CGS4285. Enrollment Requirements: Please Note: Fully Online Program students may not enroll in this class section. Prerequisites: CGS3767 Corequisite: CGS4285.