I am a 5th year PhD student at UNC Chapel Hill, dabbling in hardware security research. I am fortunate to be advised by Prof. Cynthia Sturton. Currently, my research focuses on validating the security of hardware designs. The goals of my research are to help hardware designers efficiently build more secure processors that can withstand a wide range of attack programs in the field, as well as to provide interesting insights about hardware vulnerabilities to the community. I completed my BS in Microelectronics from Peking University, and my MS in Electrical Engineering from Columbia University.
- Transys: Leveraging Common Security Properties Across Hardware Designs Rui Zhang, Cynthia Sturton IEEE Symposium on Security and Privacy (Oakland) 2020
- End-to-End Automated Exploit Generation for Validating the Security of Processor Designs Rui Zhang, Calvin Deutschbein, Peng Huang, Cynthia Sturton IEEE/ACM International Symposium on Microarchitecture (MICRO) 2018 Nominated for Best Paper Award [BibTex] [Website] [Github]
- A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs Rui Zhang, Cynthia Sturton ACM SIGPLAN International Workshop on Formal Methods and Security (FMS) 2018 [BibTex] [Website]
- Identifying Security Critical Properties for the Dynamic Verification of a Processor Rui Zhang, Natalie Stanley, Christopher Griggs, Andrew Chi, Cynthia Sturton ACM Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2017 [BibTex] [Website]
- Ultrasensitive Mass Detection Using Dual-Microcantilevers Coupled by Cruciform Overhang Rui Zhang*, Guibing Cai*, Zhiqiang Wang, Lurui Zhao, Wengang Wu IEEE International Conference on Nano/Micro Engineered and Molecular Systems (NEMS) 2013 [BibTex]
- Net-overhang Coupled Dual-Microcantilevers for Sensitive Mass Detection Guibing Cai*, Rui Zhang*, Zhiqiang Wang, Lurui Zhao, Wengang Wu IEEE SENSORS 2013 [BibTex]
- Computer Performance
- Lecture in Computer Organization Course (COMP411), Fall 2018.
- End-to-End Automated Exploit Generation for Validating the Security of Processor Designs
- SRC, August 2019.
- MICRO Conference, October 2018.
- MICRO Lightning Talk.
- A Recursive Strategy for Symbolic Execution to Find Exploits in Hardware Designs
- FMS Workshop, co-located with PLDI, June 2018.
- Identifying Security Critical Properties for the Dynamic Verification of a Processor
- Duke Triangle Machine Learning Day, April 2018.
- High Confidence Software and Systems Conference, May 2017.
- ASPLOS Conference, April 2017.
- NVIDIA, Feb 2017.
- Email: rzhang [at] cs [dot] unc [dot] edu
- Office: 346 Brooks Building
- Blog: Find me on Medium