Publications

You can also find my publications on my Google Scholar profile.

Journal Articles


Conference Papers


Enabling Plausible Deniability in Flash-based Storage through Data Permutation

Published in 41st Annual Computer Security Applications Conference (ACSAC), 2025

Weidong Zhu, Wenxuan Bao, Vincent Bindschaedler, Sara Rampazzi and Kevin R. B. Butler. Enabling Plausible Deniability in Flash-based Storage through Data Permutation. In Proceedings of 41st Annual Computer Security Applications Conference (ACSAC), 2025.

Leveraging Storage Semantics to Enhance Data Security and Privacy

Published in ACM Conference on Computer and Communications Security (CCS), 2024

Weidong Zhu. Leveraging Storage Semantics to Enhance Data Security and Privacy. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Doctoral Symposium, 2024.

RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces

Published in ACM Conference on Computer and Communications Security (CCS), 2024

Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, and Kevin Butler. RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), 2024.

Minding the Semantic Gap for Effective Storage-Based Ransomware Defense

Published in International Conference on Massive Storage Systems and Technology (MSST), 2024

Weidong Zhu, Grant Hernandez, Washington Garcia, Hunter Searle, Dave (Jing) Tian, Sara Rampazzi and Kevin Butler. Minding the Semantic Gap for Effective Storage-Based Ransomware Defense. In Proceedings of the 50th International Conference on Massive Storage Systems and Technology (MSST), 2024.

AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

Published in IEEE Symposium on Security and Privacy (S&P), 2024

Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management. In Proceedings of 45th IEEE Symposium on Security and Privacy (S&P), 2024.

Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? (SK Hynix Best Paper Award)

Published in ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023

Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi. Deep Note: Can Acoustic Interference Damage the Availability of Hard Disk Storage in Underwater Data Centers? In Proceedings of the 15th ACM Workshop on Hot Topics in Storage and File Systems (HotStorage), 2023.

HallMonitor: A Framework for Identifying Network Policy Violations in Software

Published in IEEE Conference on Communications and Network Security (CNS), 2022

Daniel Olszewski, Weidong Zhu, Sandeep Sathyanarayana, Kevin Butler and Patrick Traynor. HallMonitor: A Framework for Identifying Network Policy Violations in Software. In Proceedings of 2022 IEEE Conference on Communications and Network Security (CNS), 2022.

NASA: NVM-Assisted Secure Deletion for Flash Memory

Published in ACM SIGBED International Conference on Embedded Software (EMSOFT), 2022

Weidong Zhu and Kevin Butler. NASA: NVM-Assisted Secure Deletion for Flash Memory. In Proceedings of ACM SIGBED International Conference on Embedded Software (EMSOFT), 2022.

Emulating Samsung’s Baseband for Security Testing

Published in BlackHat USA, 2020

Grant Hernandez, Marius Muench, Tyler Tucker, Hunter Serle, Weidong Zhu, Patrick Traynor and Kevin Butler. Emulating Samsung’s Baseband for Security Testing. BlackHat USA, 2020.