Shenghan Zheng is a Ph.D. student in the Department of Computer Science of Dartmouth College with focus in computer security. He is fortunately advised by Prof. Christophe Hauser. His research interests include network security, system security, software analysis and verification. Specifically, his research incorporates multiple program analysis methods(e.g., fuzzing, symbolic execution, and reverse engineering) in combination with machine learning techniques(e.g., GNN and Large Language Model).
He earned his master's degree at UC Riverside where he was a member of UCR Security Lab. Previously, he was a member of DSP Lab at UC Irvine.
") does not match the recommended repository name for your site ("
").
", so that your site can be accessed directly at "http://
".
However, if the current repository name is intended, you can ignore this message by removing "{% include widgets/debug_repo_name.html %}
" in index.html
.
",
which does not match the baseurl
("
") configured in _config.yml
.
baseurl
in _config.yml
to "
".
Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Yue Cao, Xin'an Zhou, Zhiyun Qian
IEEE Symposium on Security and Privacy (IEEE S&P) 2025
Network side-channel attacks, such as SADDNS enabling off-path cache poisoning, are notoriously difficult to detect because current automated techniques require extensive, error-prone modeling that oversimplifies network protocols. In response, we introduce SCAD—the first solution leveraging dynamic symbolic execution to efficiently identify non-interference violations across multiple execution traces—uncovering previously unknown vulnerabilities with significantly reduced manual effort.
Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Yue Cao, Xin'an Zhou, Zhiyun Qian
IEEE Symposium on Security and Privacy (IEEE S&P) 2025
Network side-channel attacks, such as SADDNS enabling off-path cache poisoning, are notoriously difficult to detect because current automated techniques require extensive, error-prone modeling that oversimplifies network protocols. In response, we introduce SCAD—the first solution leveraging dynamic symbolic execution to efficiently identify non-interference violations across multiple execution traces—uncovering previously unknown vulnerabilities with significantly reduced manual effort.