Shenghan Zheng
Logo Graduate Student Researcher

Shenghan Zheng is a Ph.D. student in the Department of Computer Science of Dartmouth College with focus in computer security. He is fortunately advised by Prof. Christophe Hauser. His research interests include network security, system security, software analysis and verification. Specifically, his research incorporates multiple program analysis methods(e.g., fuzzing, symbolic execution, and reverse engineering) in combination with machine learning techniques(e.g., GNN and Large Language Model).

He earned his master's degree at UC Riverside where he was a member of UCR Security Lab. Previously, he was a member of DSP Lab at UC Irvine.

Curriculum Vitae

Education
  • Dartmouth College
    Dartmouth College
    Department of Computer Science
    Ph.D. Student
    Sep. 2025 - present
  • University of California, Riverside
    University of California, Riverside
    M.S. in Computer Science
    Sep. 2023 - Jun. 2025
  • University of California, Berkeley
    University of California, Berkeley
    Exchange Student in EECS
    Aug. 2021 - Jul. 2022
  • ShanghaiTech University
    ShanghaiTech University
    B.E. in Computer Science
    Sep. 2019 - Jun. 2023
Honors & Awards
  • Graduate Fellowship, UC Riverside
    2024
  • Deans Fellow Award, UC Riverside
    2024
  • Distinguished Dean's Award, UC Riverside
    2023
  • Merit Student, ShanghaiTech University
    2022
News
2025
Being accepted to Dartmouth College!
Mar
2024
Selected for Deans Fellow Award and Grdaute Fellowship!
Sep
our paper SCAD has been accepted by IEEE S&P!
Sep
1st place in Butterfly Open Match, Los Angeles Table Tennis Association!
Jul
1st place in Butterfly Open Match, Los Angeles Table Tennis Association!
Mar
1st place in Butterfly Open Match, Los Angeles Table Tennis Association!
Jan
2023
Selected for Distinguished Dean's Award
Sep
Services
Artifact Evaluation Committee
  • NDSS: 2025, 2026
  • EuroSys: 2025
  • Usenix: 2025
  • SLE: 2025
  • CCS: 2025
Registered Reviewers
  • EAI SecureComm: 2024
  • IEEE T-IFS: 2024
  • Computer Networks: 2024, 2025
External Reviewers
  • CCS: 2024
  • NDSS: 2025
Selected Publications (view all )
SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection
SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection

Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Yue Cao, Xin'an Zhou, Zhiyun Qian

IEEE Symposium on Security and Privacy (IEEE S&P) 2025

Network side-channel attacks, such as SADDNS enabling off-path cache poisoning, are notoriously difficult to detect because current automated techniques require extensive, error-prone modeling that oversimplifies network protocols. In response, we introduce SCAD—the first solution leveraging dynamic symbolic execution to efficiently identify non-interference violations across multiple execution traces—uncovering previously unknown vulnerabilities with significantly reduced manual effort.

SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection

Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Yue Cao, Xin'an Zhou, Zhiyun Qian

IEEE Symposium on Security and Privacy (IEEE S&P) 2025

Network side-channel attacks, such as SADDNS enabling off-path cache poisoning, are notoriously difficult to detect because current automated techniques require extensive, error-prone modeling that oversimplifies network protocols. In response, we introduce SCAD—the first solution leveraging dynamic symbolic execution to efficiently identify non-interference violations across multiple execution traces—uncovering previously unknown vulnerabilities with significantly reduced manual effort.

All publications