Hello there!

I am Zhuojia Shen (沈卓佳), a Software Engineer at Apple. I obtained my PhD from the Department of Computer Science at the University of Rochester, where I was advised by Prof. John Criswell. Before that, I got my Bachelor’s degree in School of Computer Science at Beijing Institute of Technology.

Research Interests

I work on the broad area of computer systems security. My current research interests lie in low-cost security enforcement on ARM systems, using novel combinations of hardware and architectural features as well as operating system and compiler techniques. I also had experience developing novel software-based defenses against side-channel attacks.

Publications

  1. Zhuojia Shen. Enforcing Low-Cost Security for ARM. Ph.D. Dissertation. University of Rochester. September 2023.

  2. Zhuojia Shen and John Criswell. InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion. arXiv preprint arXiv:2304.08717. April 2023.

  3. Zhuojia Shen, Komail Dharsee, and John Criswell. Randezvous: Making Randomization Effective on MCUs. In Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22). Austin, TX, USA. December 2022.

  4. Yufei Du, Zhuojia Shen, Komail Dharsee, Jie Zhou, Robert J. Walls, and John Criswell. Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage. In Proceedings of the 31st USENIX Security Symposium (Security '22). Boston, MA, USA. August 2022.

  5. Zhuojia Shen, Komail Dharsee, and John Criswell. Fast Execute-Only Memory for Embedded Systems. In Proceedings of the 2020 IEEE Secure Development Conference (SecDev '20). Atlanta, GA, USA. September 2020.

  6. Jie Zhou, Yufei Du, Zhuojia Shen, Lele Ma, John Criswell, and Robert J. Walls. Silhouette: Efficient Protected Shadow Stacks for Embedded Systems. In Proceedings of the 29th USENIX Security Symposium (Security '20). Boston, MA, USA. August 2020.

  7. Zhuojia Shen, Jie Zhou, Divya Ojha, and John Criswell. Restricting Control Flow During Speculative Execution with Venkman. arXiv preprint arXiv:1903.10651. March 2019.

  8. Zhuojia Shen, Jie Zhou, Divya Ojha, and John Criswell. POSTER: Restricting Control Flow During Speculative Execution. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18). Toronto, ON, Canada. October 2018.

  9. Xiaowan Dong, Zhuojia Shen, John Criswell, Alan L. Cox, and Sandhya Dwarkadas. Shielding Software from Privileged Side-Channel Attacks. In Proceedings of the 27th USENIX Security Symposium (Security '18). Baltimore, MD, USA. August 2018.

  10. Xiaowan Dong, Zhuojia Shen, John Criswell, Alan Cox, and Sandhya Dwarkadas. Spectres, Virtual Ghosts, and Hardware Support. In Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP '18). Los Angeles, CA, USA. June 2018.

  11. Weixing Ji, Qinghui Liu, Guizhen Wang, and Zhuojia Shen. Embedding of Hypercube into Cylinder. arXiv preprint arXiv:1511.07932. November 2015.