We welcome students (both undergrad and graduate) with interests in topics related to computer security and privacy, including system security/side channels/data privacy/trusted execution environments/privacy-preserving technologies etc. Please drop me an email for more information.

Visit our lab website at https://nsec.sjtu.edu.cn/.

Short Bios

I am currently an assistant professor at the Department of Computer Science and Engineering of Shanghai Jiao Tong University (SJTU). Before joining SJTU in March 2021, I was a research scientist at Facebook, Inc. I received my Ph.D. degree from the Ohio State University in 2019. My advisors are Prof. Ten H. Lai and Prof. Yinqian Zhang. I obtained my master’s and bachelor’s degrees from SJTU in 2013 and 2010 respectively.

News

  • (2022/12)[Committee] I am invited to serve on the Program Committee for ACM CCS 2023.
  • (2022/12)[Paper] Our paper, “MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging”, has been accepted to appear in INFOCOM 2023!
  • (2022/10)[Paper] Our paper, “RAI$^2$: Responsible Identity Audit Governing the Artificial Intelligence”, has been accepted to appear in NDSS 2023!
  • (2022/09)[Paper] Our paper, “POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices”, has been accepted to appear in USENIX Security 2023!
  • (2022/07)[Paper] Our paper, “Securing TEEs With Verifiable Execution Contracts”, has been accepted to IEEE TDSC!
  • (2022/07)[Paper] Our paper, “Secure Hierarchical Deterministic Wallet Supporting Stealth Address”, has been accepted to appear in ESORICS 2022!
  • (2022/06)[Committee] I am invited to serve on the Program Committee for ACM CCSW 2022.
  • (2022/03)[Committee] I am invited to serve on the Program Committee for USENIX Security 2023.
  • (2022/03)[Paper] Our paper, “Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations”, has been accepted to appear in CVPR 2022!
  • (2022/02)[Committee] I am invited to serve on the Program Committee for IEEE SEED 2022.
  • (2021/12)[Committee] I am invited to serve on the Program Committee for ACM CCS 2022.
  • (2021/12)[Committee] I am invited to serve on the Program Committee for EAI SecureComm 2022.
  • (2021/12)[Paper] Our paper, “Multi-Certificate Attacks Against Proof-of-Elapsed-Time and Their Countermeasures”, has been accepted to appear in NDSS 2022!
  • (2021/09)[Paper] Our paper, “MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties”, has been accepted to appear in USENIX Security 2022!

Publications

  1. [Security’23] POLICYCOMP: Counterpart Comparison of Privacy Policies Uncovers Overbroad Personal Data Collection Practices
    Lu Zhou, Chengyongxiao Wei, Tong Zhu, Guoxing Chen, Xiaokuan Zhang, Suguo Du, Hui Cao, Haojin Zhu
    USENIX Security Symposium, Anaheim, CA, USA, Aug. 2023.
    [Pdf]
  2. [INFOCOM’23] MagFingerprint: A Magnetic Based Device Fingerprinting in Wireless Charging
    Jiachun Li, Yan Meng, Le Zhang, Guoxing Chen, Yuan Tian, Haojin Zhu , Sherman Shen
    IEEE International Conference on Computer Communications, New York area, USA, May. 2023.
    [Pdf]
  3. [NDSS’23] RAI$^2$: Responsible Identity Audit Governing the Artificial
    Tian Dong, Shaofeng Li, Guoxing Chen, Minhui Xue, Haojin Zhu, Zhen Liu
    Network and Distributed System Security Symposium, San Diego, CA, USA, Mar. 2023.
    [Pdf]
  4. [ESORICS’22] Secure Hierarchical Deterministic Wallet Supporting Stealth Address
    Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
    European Symposium on Research in Computer Security, Copenhagen, Denmark, Sep. 2022.
    [Pdf]
  5. [TDSC] Securing TEEs With Verifiable Execution Contracts
    Guoxing Chen, Yinqian Zhang
    IEEE Transactions on Dependable and Secure Computing, Jul. 2022.
    [Link] | [Source code]
  6. [Security’22] MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
    Guoxing Chen, Yinqian Zhang
    USENIX Security Symposium, Boston, MA, USA, Aug. 2022.
    [Pdf] | [Source code]
  7. [CVPR’22] Fingerprinting Deep Neural Networks Globally via Universal Adversarial Perturbations
    Zirui Peng, Shaofeng Li, Guoxing Chen, Cheng Zhang, Haojin Zhu, Minhui Xue
    Conference on Computer Vision and Pattern Recognition, New Orleans, LA, USA, Jun. 2022.
    [Pdf]
  8. [NDSS’22] Multi-Certificate Attacks Against Proof-of-Elapsed-Time and Their Countermeasures
    Huibo Wang, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin
    Network and Distributed System Security Symposium, San Diego, CA, Feb. 2022.
    [Pdf]
  9. [Security’21] Towards Formal Verification of State Continuity for Enclave Programs
    Mohit Kumar Jangid, Guoxing Chen, Yinqian Zhang, Zhiqiang Lin
    USENIX Security Symposium, Virtual, Aug. 2021.
    [Pdf]
  10. [DIMVA’21] SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing
    Wubing Wang, Guoxing Chen, Yueqiang Cheng, Yinqian Zhang, Zhiqiang Lin
    Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Virtual, Jul. 2021.
    [Pdf]
  11. [IEEE Secur & Priv] SgxPectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution
    Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai
    IEEE Secur. Priv. 18(3): 28-37 (2020).
    [Link]
  12. [DSC’19] Defeating Speculative-Execution Attacks on SGX with HyperRace
    Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang
    IEEE Conference on Dependable and Secure Computing, Hangzhou, China, Nov. 2019.
    [Pdf]
  13. [CCS’19] OPERA: Open Remote Attestation for Intel’s Secure Enclaves
    Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai
    ACM Conference on Computer and Communications Security, London, UK, Nov. 2019.
    [Pdf] | [Project Homepage]
  14. [EuroS&P’19] SgxPectre: Stealing Intel Secrets from SGX Enclaves via Speculative Execution
    Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai
    IEEE European Symposium on Security and Privacy, Stockholm, Sweden, Jun. 2019.
    [Pdf] | [Project Homepage]
  15. [S&P’18] Racing in Hyperspace: Closing Hyper-Threading Side Channels on SGX with Contrived Data Races
    Guoxing Chen*, Wenhao Wang* (*co-first authors), Tianyu Chen, Sanchuan Chen, Yinqian Zhang, XiaoFeng Wang, Ten-Hwang Lai, Dongdai Lin
    IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May. 2018.
    [Pdf] | [Presentation]
  16. [INFOCOM’18] Differentially Private Access Patterns for Searchable Symmetric Encryption
    Guoxing Chen, Ten H. Lai, Michael Reiter, Yinqian Zhang
    IEEE International Conference on Computer Communications, Honolulu, Hawaii, USA, Apr. 2018.
    [Pdf] | [Source code]
  17. [CCS’17] Leaky Cauldron on the Dark Land: Understanding Memory Side-Channel Hazards in SGX
    Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, Carl A. Gunter
    ACM Conference on Computer and Communications Security, Dallas, Texas, USA, Oct. 2017.
    [Pdf]
  18. [ICDCS’17] EV-Matching: Bridging Large Visual Data and Electronic Data for Efficient Surveillance
    Gang Li, Fan Yang, Guoxing Chen, Qiang Zhai, Xinfeng Li, Jin Teng, Junda Zhu, Dong Xuan, Biao Chen and Wei Zhao
    IEEE International Conference on Distributed Computing Systems, Atlanta, GA, USA, Jun. 2017.
    [Pdf]
  19. [INFOCOM’16] Flash-Loc: Flashing Mobile Phones for Accurate Indoor Localization
    Fan Yang, Qiang Zhai, Guoxing Chen, Adam C. Champion, Junda Zhu, Dong Xuan
    IEEE International Conference on Computer Communications, San Francisco, CA, USA, Apr. 2016.
    [Pdf]
  20. [ICDCS’15] Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices
    Jihun Hamm, Adam C. Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan
    IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, USA, Jun. 2015.
    [Pdf]
  21. [MoBiData’15] Mobile Data Collection Frameworks: A Survey
    Paul Y. Cao, Gang Li, Guoxing Chen, Biao Chen
    Workshop on Mobile Big Data, Hangzhou, China, Jun. 2015.
  22. [SAM’14] Detecting the Vulnerability of Multi-Party Authorization Protocols to Name Matching Attacks
    Wenjie Lin, Guoxing Chen, Ten H. Lai, David Lee
    International Conference on Security and Management, Las Vegas, NV, USA, Jul. 2014.
    [Pdf]
  23. [WCL] On Degrees of Freedom of Cognitive Networks with User Cooperation
    Guoxing Chen, Zhengzheng Xiang, Changqing Xu, Meixia Tao
    IEEE Wireless Communications Letters, Dec. 2012.
    [Link]

Professional Activities

Program Committee Member

  • ACM Conference on Computer and Communications Security (CCS) 2022, 2023
  • USENIX Security Symposium 2023
  • ACM Asia Conference on Computer and Communications Security (ASIACCS) 2021, 2022
  • EAI International Conference on Security and Privacy in Communication Networks (SecureComm), 2022
  • IEEE International Symposium on Secure and Private Execution Environment Design (SEED) 2021, 2022
  • ACM Cloud Computing Security Workshop (CCSW) 2020, 2021, 2022
  • IEEE International Conference on Cloud Computing Technology and Science (CloudCom) 2020

Journal Reviewer

  • IEEE Transactions on Dependable and Secure Computing (TDSC)
  • IEEE Transactions on Information Forensics and Security (TIFS)
  • IEEE Transactions on Parallel and Distributed Systems (TPDS)
  • ACM Transactions on Privacy and Security (TOPS)
  • ACM Transactions on Sensor Networks (TOSN)
  • IEEE Transactions on Services Computing (TSC)
  • IEEE Computer Architecture Letters (CAL)

Last updated: 2023/02/14.