Xin'an Emmanuel Zhou (@zhouxinan) 's Twitter Profile
Xin'an Emmanuel Zhou

@zhouxinan

A 🏳️‍🌈 Computer Security PhD candidate at @UCRiverside.

ID: 3062627454

linkhttps://xinanzhou.com/ calendar_today05-03-2015 10:14:03

337 Tweet

727 Followers

673 Following

Romain Cayre (@cayreromain) 's Twitter Profile Photo

After two years of hard work with Damien Cauquil (@[email protected]) , we are proud to release for DEFCON32 the first public version of WHAD, a whole new ecosystem of opensource libs, tools & firmwares for wireless security ! The main repo is here: github.com/whad-team/whad… . And now, demo time ! [1/n]

Mathy Vanhoef (@vanhoefm) 's Twitter Profile Photo

We've spotted some confusion about the SSID confusion attack. It's not an attack attack to panic about, but it's nice research to make one think about threat models. Some clarifications are at mathyvanhoef.com/2024/08/the-ss…

Team Atlanta (@teamatlanta24) 's Twitter Profile Photo

#AIxCC Team Atlanta is having an amazing time with SSLab alumni in Las Vegas! Now, we’re waiting for the Grand Final qualifiers announcement. #DEFCON32

#AIxCC Team Atlanta is having an amazing time with <a href="/SSLab_Gatech/">SSLab</a> alumni in Las Vegas! Now, we’re waiting for the Grand Final qualifiers announcement. #DEFCON32
Endless Router Bugs (@router_bugs) 's Twitter Profile Photo

Qian, et al Zhiyun Qian from UC Riverside presented at BlackHat blackhat.com/us-24/briefing… about systemic problems with the consumer wifi wireless mesh networks due to broken trust models and security flaws

Yicheng Zhang (@yichengzhang4) 's Twitter Profile Photo

Happy to share one paper to be presented this week in USENIX Security "That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications". Work done with Carter Slocum, Erfan Shayegani , Pedram Zaree, Jiasi Chen, and Nael Abu-Ghazaleh. Talk is on 08/15 at 10:45 am.

Happy to share one paper to be presented this week in <a href="/USENIXSecurity/">USENIX Security</a> 
"That Doesn't Go There: Attacks on Shared State in Multi-User Augmented Reality Applications". Work done with <a href="/CarterSlocum/">Carter Slocum</a>, <a href="/Erf_Shayegani/">Erfan Shayegani</a> , Pedram Zaree, <a href="/jiasic/">Jiasi Chen</a>, and <a href="/nael_ag/">Nael Abu-Ghazaleh</a>. Talk is on 08/15 at 10:45 am.
Yicheng Zhang (@yichengzhang4) 's Twitter Profile Photo

Are you interested in Microarchitecture and Hardware Security? Please check this blog, which summarizes all related papers in USENIX Security 2024! Microarchitecture and Hardware Security Research at USENIX Security Symposium 2024 sigarch.org/microarchitect…

Are you interested in Microarchitecture and Hardware Security? Please check this blog, which summarizes all related papers in USENIX Security 2024!

Microarchitecture and Hardware Security Research at USENIX Security Symposium 2024 sigarch.org/microarchitect…
Xin'an Emmanuel Zhou (@zhouxinan) 's Twitter Profile Photo

Patch your #asus AiMesh routers immediately! The exploitation code is available at seclab-ucr.github.io/CCS24Mesh/ASUS/. Attackers can abuse this protocol to root/remote-jailbreak affected routers. Patches are fully available already! #netsec

Dongdong She (@dongdongshe) 's Twitter Profile Photo

Are general-purpose fuzzing research dead? Our answer is probably no. Check our new fuzzer work FOX. The awesome fuzzer @aflplusplus is already super-powerful and quite an effective baseline in academics and industry. But there is still room to improve upon. We introduce FOX

Are general-purpose fuzzing research dead? Our answer is probably no.  Check our new fuzzer work FOX. 

The awesome fuzzer @aflplusplus  is already super-powerful and quite an effective baseline in academics and industry. But there is still room to improve upon. We introduce FOX
Zhiyun Qian (@pkqzy888) 's Twitter Profile Photo

Xin'an Emmanuel Zhou will present "Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks" at ACM CCS 2024 this afternoon at 2:15pm. We show a LAN attacker can gain root shells on access points, affecting popular vendors such as Netgear, Asus, TP-link, Linksys.

<a href="/zhouxinan/">Xin'an Emmanuel Zhou</a> will present "Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks" at <a href="/acm_ccs/">ACM CCS 2024</a> this afternoon at 2:15pm. We show a LAN attacker can gain root shells on access points, affecting popular vendors such as Netgear, Asus, TP-link, Linksys.
Yizheng Chen (@surrealyz) 's Twitter Profile Photo

I am recruiting PhD students & Postdocs on AI Security, LLM Agents, Code Generation research at UMD Computer Science UMD Department of Computer Science & Maryland Cybersecurity Center Maryland Cybersecurity Center (MC2) For PhD program pls mention me in your application cs.umd.edu/grad/apply. For Postdocs please email me.

sofía celi (@claucece) 's Twitter Profile Photo

Our beautiful "DiStefano" - a zkTLS protocol- paper (with Hamed alexー gpestana Joe Rowell) just won Distinguished Paper Award at NDSS Symposium ! eprint.iacr.org/2023/1063.pdf Such an honour! Upcoming work as part of Brave coming!!

Our beautiful "DiStefano" - a zkTLS protocol- paper (with  <a href="/realhamed/">Hamed</a> <a href="/alxdavids/">alexー</a> <a href="/gpestana/">gpestana</a> <a href="/joerowell/">Joe Rowell</a>) just won Distinguished Paper Award at <a href="/NDSSSymposium/">NDSS Symposium</a> ! eprint.iacr.org/2023/1063.pdf Such an honour! Upcoming work as part of <a href="/brave/">Brave</a> coming!!
Zhiyun Qian (@pkqzy888) 's Twitter Profile Photo

(1/3) Tomorrow at S&P, Keyu will present our work on automatically discovering network side-channel vulnerabilities in TCP/UDP. From static analysis (CCS'15) and model checking (CCS'19), this work uses symbolic execution. We have now explored a spectrum of analysis and understood

(1/3) Tomorrow at S&amp;P, Keyu will present our work on automatically discovering network side-channel vulnerabilities in TCP/UDP. From static analysis (CCS'15) and model checking (CCS'19), this work uses symbolic execution. We have now explored a spectrum of analysis and understood
Mathy Vanhoef (@vanhoefm) 's Twitter Profile Photo

Our research on open tunneling servers got nominated for the Most Innovative Research award :) The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security Brief summary and code: github.com/vanhoefm/tunne… Paper: papers.mathyvanhoef.com/usenix2025-tun…

Pwnie Awards (@pwnieawards) 's Twitter Profile Photo

We are very happy to announce the nominees for the 2025 Pwnie Awards! As a reminder, we will be presenting the winners at DEF CON this year. Saturday the 9th, 10:00AM Main Stage. Hope to see you there! docs.google.com/document/d/1fy…

Xin'an Emmanuel Zhou (@zhouxinan) 's Twitter Profile Photo

Untangling the Knot (untanglingthekn0t.com) was nominated for Best Cryptographic Attack at the Pwnie Awards 2025. It uncovers fundamental flaws of crypto protocols in mesh Wi-Fi systems. Exploits and summary: untanglingthekn0t.com