Portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 1
Short description of portfolio item number 2 
Short description of portfolio item number 1
Published in IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2018
Suzhen Wu, Weidong Zhu, Guixin Liu, Hong Jiang, and Bo Mao. GC-aware Request Steering with Improved Performance and Reliability for SSD-based RAIDs. In Proceedings of the 32nd IEEE International Parallel & Distributed Processing Symposium (IPDPS), 2018.
Published in Future Generation Computer Systems, 2018
Suzhen Wu, Weidong Zhu, Bo Mao, Kuan-Ching Li. PP: Popularity-based Proactive Data Recovery for HDFS RAID Systems. Future Generation Computer Systems. September 2018.
Published in IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2020
Suzhen Wu, Weidong Zhu, Yingxin Han, Hong Jiang, Bo Mao, Zhijie Huang, and Liang Chen. GC-Steering: GC-aware Request Steering and Parallel Reconstruction Optimizations for SSD-based RAIDs. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD), 2020.
Published in IEEE International Conference on Computer Design (ICCD), 2020
Suzhen Wu, Jindong Zhou, Weidong Zhu, Hong Jiang, Zhijie Huang, Zhirong Shen, and Bo Mao. EaD: a Collision-free and High Performance ECC assisted Deduplication Scheme for Flash Storage. In Proceedings of the 38th IEEE International Conference on Computer Design (ICCD), 2020.
Published in BlackHat USA, 2020
Grant Hernandez, Marius Muench, Tyler Tucker, Hunter Serle, Weidong Zhu, Patrick Traynor and Kevin Butler. Emulating Samsung’s Baseband for Security Testing. BlackHat USA, 2020.
Published in ACM SIGBED International Conference on Embedded Software (EMSOFT), 2022
Weidong Zhu and Kevin Butler. NASA: NVM-Assisted Secure Deletion for Flash Memory. In Proceedings of ACM SIGBED International Conference on Embedded Software (EMSOFT), 2022.
Published in IEEE Conference on Communications and Network Security (CNS), 2022
Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin Butler and Patrick Traynor. HallMonitor: A Framework for Identifying Network Policy Violations in Software. In Proceedings of 2022 IEEE Conference on Communications and Network Security (CNS), 2022.
Published in IEEE Transactions on Computers (TC), 2022
Suzhen Wu, Chunfeng Du, Weidong Zhu, Hong Jiang, Bo Mao, and Lingfang Zeng. EaD: ECC-assisted Deduplication with High Performance and Low Memory Overhead for Ultra-Low Latency Flash Storage. IEEE Transactions on Computers (TC), 2022.
Published in ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023
Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? In Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023.
Published in IEEE Symposium on Security and Privacy (S&P), 2024
Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. In Proceedings of 45th IEEE Symposium on Security and Privacy (S&P), 2024.
Published in International Conference on Massive Storage Systems and Technology (MSST), 2024
Weidong Zhu, Grant Hernandez, Washington Garcia, Hunter Searle, Dave (Jing) Tian, Sara Rampazzi and Kevin Butler. Minding the Semantic Gap for Effective Storage-Based Ransomware Defense. In Proceedings of the 50th International Conference on Massive Storage Systems and Technology (MSST), 2024.
Published in ACM Conference on Computer and Communications Security (CCS), 2024
Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, and Kevin Butler. RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2024.
Published in ACM Conference on Computer and Communications Security (CCS), 2024
Weidong Zhu. Leveraging Storage Semantics to Enhance Data Security and Privacy. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Doctoral Symposium, 2024.
Published in SPIE Defense and Commercial Sensing, 2025
Blow David, Adnan Abdullah, Jennifer Sheldon, Weidong Zhu, Md Jahidul Islam, and Sara Rampazzi. Detection and Localization of Acoustic Vulnerabilities of Underwater Data Centers for Remote Surveillance. SPIE Defense and Commercial Sensing, 2025.
Published in ACM Transactions on Storage (TOS), 2025
Weidong Zhu, Grant Hernandez, Washington Garcia, Dave (Jing) Tian, Sara Rampazzi and Kevin Butler. Minding the Semantic Gap for Effective Storage-Based Ransomware Defense. In ACM Transactions on Storage, 2025.
Published in ACM Conference on Computer and Communications Security (CCS), 2025
Weidong Zhu, Carson Stillman, Sara Rampazzi and Kevin Butler. Enabling Secure and Efficient Data Loss Prevention with a Retention-aware Versioning SSD. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2025.
Download Paper
Published in 41st Annual Computer Security Applications Conference (ACSAC), 2025
Weidong Zhu, Wenxuan Bao, Vincent Bindschaedler, Sara Rampazzi and Kevin R. B. Butler. Enabling Plausible Deniability in Flash-based Storage through Data Permutation. In Proceedings of 41st Annual Computer Security Applications Conference (ACSAC), 2025.
Leveraging LLM to facilitate software security, including bug testing and software debloating.
Investigating and defending against modern malware and cyberattacks.
Overcoming privacy leaks led by the physical characteristics of emerging memory and storage systems.
Enabling efficient bug testing for the software modules within the I/O stack.
Published:
This is a description of your talk, which is a markdown file that can be all markdown-ified like any other post. Yay markdown!
Published:
This is a description of your conference proceedings talk, note the different field in type. You can put anything in this field.
Undergraduate course, FIU, 2025
Fundamental concepts and principles of computing and network security, symmetric and asymmetric cryptography, hash functions, authentication, firewalls and intrusion detection, and operational issues. Prerequisites: CGS3767 Corequisite: CGS4285. Enrollment Requirements: Please Note: Fully Online Program students may not enroll in this class section. Prerequisites: CGS3767 Corequisite: CGS4285.