Selected publications

Journal papers

  • E. Faulkner, Z. Yun, S. Zhou, Z. Shi, S. Han, and G. Giannakis. An Advanced GNU-Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer. Accepted and to appear in IEEE IoT Journal (IoTJ). 2021.
  • C. Ma, J. Chandy, Z. Shi. Algebraic Side-Channel Attack on Twofish. Journal of Internet Services and Information Security, vol. 7, no. 2, pp. 32-43, May 2017.
  • Y. Huang, S. Zhou, Z. Shi, and L. Lai, “Channel frequency response based secret key generation in underwater acoustic systems,” IEEE Transactions on Wireless Communications, vol. 15, no. 9, pp. 5875 – 5888, Sept. 2016.
  • Y. Huang, P. Xiao, S. Zhou, and Z. Shi, “A half-duplex self-protection jamming approach for improving secrecy of block transmissions in underwater acoustic channels,” IEEE Sensors Journal, vol. 16, no. 11, pp. pp. 4100–4109, June 2016.
  • X. Cai, L. Wan, Y. Huang, S. Zhou, and Z. Shi, “Further results on multicarrier MFSK based underwater acoustic communications,” Elsevier Journal of Physical Communication, vol. 18, no. 1, p. 15 – 27, Mar. 2016.
  • L. Wan, H. Zhou, X. Xu, Y. Huang, S. Zhou, Z. Shi, and J.-H. Cui, “Adaptive modulation and coding for underwater acoustic OFDM,” IEEE Journal of Oceanic Engineering, vol. 40, no. 2, pp. 327-336, Apr. 2015.
  • L. Wan, H. Zhou, D. Wilson, J. Hanson, S. Zhou, and Z. Shi, “Analysis of Underwater OFDM Performance During a 2-Month Deployment in Chesapeake Bay,” Marine Technology Society Journal, vol. 48, no. 2, pp. 52-64, 2014.
  • L. Wan, H. Zhou, X. Xu, Y. Huang, S. Zhou, Z. Shi, and J. Cui. Adaptive modulation and coding for underwater acoustic OFDM. IEEE Journal of Oceanic Engineering, 2014. (DOI 10.1109/JOE.2014.2323365).
  • Shize Guo, Xinjie Zhao, Fan Zhang, Tao Wang, Zhijie Shi, Francois-Xavier Standaert, Chujiao Ma. Exploiting the Incomplete Diffusion Feature: A Specialized Analytical Side-Channel Attack Against the AES and Its Application to Microcontroller Implementations. IEEE Transactions on Information Forensics and Security, vol. 9, no. 6, pp. 999 – 1014, June 2014.
  • W. Zeng, J. Cote, X. Chen, Y. Kim, W. Wei, K. Suh, B. Wang, and Z. Shi, “Delay monitoring for wireless sensor networks: An architecture using air sniffers,” Elsevier Journal of Ad Hoc Networks, vol. 13, pp. 549-559, 2014.
  • Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais. A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. Elsevier Computers and Security, vol. 39, Part B, pp. 173–189, November 2013. DOI: 10.1016/j.bbr.2011.03.031.
  • Xinjie Zhao, Shize Guo, Fan Zhang,  Tao Wang,  Zhijie Shi, Huiying Liu, Keke Ji, and Jing Huang, “Efficient Hamming weight-based side-channel cube attacks on PRESENT,” Elsevier Journal of Systems and Software, vol. 86, no. 3, pp. 728-743, March 2013.
  • Xinjie Zhao, Shize Guo, Fan Zhang,  Tao Wang,  Zhijie Shi, and Hao Luo. Enhanced Side-Channel Cube Attacks on PRESENT. IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E96-A,  No.1,  pp.332-339, January 2013.
  • X. Zhao, S. Guo, T. Wang, F. Zhang and Z. Shi, “Fault-Propagate Pattern based DFA on PRESENT and PRINTcipher,” Wuhan University Journal of Natural Sciences. Vol. 17, No. 6, pp. 485-493, October 2012.
  • Xian Chen, Yoo-Ah Kim, Bing Wang, Wei Wei, Zhijie Shi and Yuan Song, “Fault-tolerant Monitor Placement for Out-of-band Wireless Sensor Network Monitoring,” Elsevier Journal of Ad Hoc Networks, Vol. 10, No. 1, pp. 62-74, January 2012.
  • L. Wan, Zhaohui Wang, Shengli Zhou, T.C. Yang and Zhijie Shi, “Performance Comparison of Doppler Scale Estimation Methods for Underwater Acoustic OFDM,” Journal of Electrical and Computer Engineering, Special Issue on Underwater Communications and Networks, doi:10.1155/2012/703243, 2012.
  • Hai Yan, Lei Wan, Shengli Zhou, Zhijie Shi, Jun-Hong Cui, Jie Huanga, and Hao Zhou, “DSP based receiver implementation for OFDM acoustic modems,” Physical Communication, September 2011.
  • Z. Peng, H. Mo, J. Liu, Z. Wang, H. Zhou, X. Xu, S. Le, Y. Zhu, J.-H. Cui, Z. Shi, S. Zhou, “NAMS: A Networked Acoustic Modem System for Underwater Applications,” Proceedings of MTS/IEEE OCEANS Conference, KONA, Hawaii, September 19-22, 2011
  • R.Z. Zhou, J.Z. Peng, J-H. Cui, A. Bagtzoglou, and Z. Shi, “Scalable Localization with Mobility Prediction for Underwater Sensor Networks,” IEEE Transactions on Mobile Computing, Vol. 10, No. 3, pp. 335-348, March 2011.
  • R.Z. Zhou, J.Z. Peng, J-H. Cui and Z. Shi, “Efficient Multipath Communication for Time-Critical Applications in Underwater Acoustic Sensor Networks,” IEEE/ACM Transactions on Network, vol. 19, no. 1, pp. 28-41, February 2011.
  • Zhou, Z. Peng, J. Cui, Z. Shi, and A. Bagtzoglou, “Scalable Localization with Mobility Prediction for Underwater Sensor Networks,” IEEE Transaction on mobile computing (TMC), vol. 10, no. 3, pp. 335-348, 2011.
  • Xie, Z. Zhou, N.C. Nicolaou, A. See, J-H Cui, and Z. Shi, “Efficient Vector-Based Forwarding for Underwater Sensor Networks,” EURASIP Journal of Wireless Communication and Networking, vol. 2010, 13 pages, 2010.
  • Lin, Y. Fei, X. Guan, and Z. Shi, “Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors,” IEEE Transactions on Very Large Scale Integration (VLSI) Systems, pp. 1519 – 1532, vol. 18, no. 11, November 2010.
  • Xie, Z. Zhou, Z. Peng, J. Cui, and Z. Shi, “SDRT: A Reliable Data Transfer Protocol for Underwater Acoustic Sensor Networks,” Ad Hoc Networks, vol 8, no. 7, pp. 708-722, September 2010.
  • Yan and Z. Shi, “Software Implementations of Elliptic Curve Cryptography”, International Journal of Network Security, vol. 7, no. 1, pp. 141-150, July 2008.
  • Shi, X. Yang, and R. B. Lee, “Alternative application-specific processor architecture for fast arbitrary bit permutations,” International Journal of Embedded Systems (IJES), vol. 3, no. 4, pp. 219 – 228, 2008.
  • R. B. Lee, X. Yang, and Z. Shi, “Single-cycle bit permutations with MOMR execution,” Journal of Computer Science and Technology, vol. 20, no. 5, pp. 577-585, September 2005.
  • R. B. Lee, Z. Shi and X. Yang, “Efficient permutation instructions for fast software cryptography,” IEEE Micro, vol. 21, no. 6, pp. 56-69, December 2001.

Conference papers:

  • K. Kerliu, A. Ross, T. Gong, Z. Yun, Z. Shi, S. Han, and S. Zhou, “Secure Over-The-Air Firmware Updates for Sensor Networks,” The Sixth National Workshop for REU Research in Networking and Systems (REUNS 2019), November 2019.
  • G. Wang, Z. Shi, M. Nixon, S. Han, “SoK: Sharding on Blockchain”, Proceedings of the first ACM Conference on Advances in Financial Technologies (AFT 2019), October 2019.
  • G. Wang, Z. Shi, M. Nixon, S. Han, “ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage”, Proceedings of the 2nd IEEE International Conference on Blockchain (Blockchain), July 2019.
  • G. Wang, Z. Shi, M. Nixon, S. Han, “SMChain: a scalable blockchain protocol for secure metering systems in distributed industrial plants”, Proceedings of the International Conference on Internet of Things Design and Implementation (IoTDI), April 2019.
  • A. Miyajan, Z. Shi, C. Huang, T. F. Al-Somani, “An Efficient High-Order Masking of AES using SIMD,” Proceedings of Tenth International Conference on Computer Engineering & Systems (ICCES), pp. 363-368, December 2015.
  • A. Miyajan, Z. Shi, C. Huang, T. F. Al-Somani, “Accelerating higher-order masking of AES using composite field and SIMD,” Proc. of the 15-th IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), pp. 575-580, December 2015.
  • J. Chandy, Z. Shi, M. Tehranipoor, M. Welsh, C. Ma, U. Guin, Q. Shi, Hardware Hacking: An Approach to Trustable Computing Systems Security Education. Proceedings of the Colloquium for Information System Security Education. December 2015.
  • L. Wan, H. Zhou, X. Xu, Y. Huang, S. Zhou, Z. Shi, and J. Cui, “Field Tests of Adaptive Modulation and Coding for Underwater Acoustic OFDM,” Proceedings of ACM International Conference on UnderWater Networks (WUWNET 2013), Short Paper, November 2013.
  • M. Zuba, M. Fagan, J. Cui, and Z. Shi, “A Vulnerability Study of Geographic Routing in Underwater Acoustic Networks,” Proceedings of IEEE Conference on Communications and Network Security (CNS 2013), October 2013.
  • X. Zhao, S. Guo, F. Zhang, Z. Shi, T. Wang, and C. Ma, “Improving and Evaluating Differential Fault Analysis on LED with Algebraic Techniques,” Proceedings of the Tenth Workshop on Fault Diagnosis and Tolerance in Cryptography, August 2013.
  • F. Zhang, Xinjie Zhao, S. Guo, T. Wang, Z. Shi, “Improved Algebraic Fault Analysis: A Case Study on Piccolo and Applications to Other Lightweight Block Ciphers,” Proceedings of Third International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), LNCS 7275, March 2013.
  • Juan Carlos Martinez Santos, Y. Fei, Z. Shi, “Static secure page allocation for light-weight dynamic information flow tracking”, Proceedings of International Conferences on Compilers, Architecture & Synthesis for Embedded Systems (CASES) 2012, pp. 27-36, August 2012.
  • L. Wan, S. Hurst, Z.-H. Wang, S. Zhou, Z. Shi, and S. Roy, “Joint linear precoding and non-binary LDPC coding for underwater acoustic OFDM,” in Proceedings of IEEE/MTS OCEANS conference, October 2012.
  • Xinjie Zhao, Fan Zhang, Shize Guo, Tao Wang, Zhijie Shi, Huiying Liu, Keke Ji, “MDASCA: An Enhanced Algebraic Side-Channel Attack for Error Tolerance and New Leakage Model Exploitation,” Proceedings of Third International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE), LNCS 7275, pp, 231-248, May 2012, Darmstadt, Germany, best paper award.
  • M. Zuba, Z. Shi, Z. Peng, and J.-H. Cui, “Launching Denial-of-Service Jamming Attacks in Underwater Sensor Networks,” Proceedings of The Second ACM International Workshop on UnderWater Networks (WUWNET), Short Paper, December 2011.
  • Z. Fan and Z. Shi, “Differential and Correlation Power Analysis Attacks on HMAC-Whirlpool,” Proceedings of International Conference on Information Technology: New Generations (ITNG 2011), pp. 359-365, April 2011.
  • J. Cote, B. Wang, W. Zeng, and Z. Shi, “Capability and Fidelity of Mote-class Wireless Sniffers,” Proceedings of GLOBECOM  2010, pp. 1-6, December 2010.
  • H. Yan, S. Zhou, Z. Shi, J.-H. Cui, L. Wan, J. Huang, and H. Zhou, “DSP implementation of SISO and MIMO OFDM acoustic modems,” Proceedings of MTS/IEEE OCEANS Conference, May 2010.
  • J. C. M. Santos, Y. Fei, and Z. Shi, “PIFT: Efficient Dynamic Information Flow Tracking Using Secure Page Allocation,” Proceedings of the 4th Workshop on Embedded Systems Security, article 6, pp. 58-65, October 2009.
  • W. Zeng, X. Chen, Z. Bu, W. Wei, B. Wang, and Z. Shi, “Delay monitoring and abnormal delay detection using sniffers for wireless sensor networks,” Proceedings of Military Communications Conference (MILCOM), pp. 1-8, October 2009. 
  • Z. Peng, Z. Zhou, J. Cui, and Z. Shi, “Aqua-Net: A Network Solution to Underwater Networks,” Proceedings of OCEANS, pp. 1-7, October 2009.
  • P. Xie, J. Sun, H. Yan, T. Hu, J. Cui, Z. Shi, Y. Fei, and S. Zhou, “Aqua-Sim: An NS-2 Based Simulator for Underwater Sensor Networks,” Proceedings of OCEANS, pp. 1-7, October 2009.
  • P. Xie, Z. Zhou, Z. Peng, J. Cui, Z. Shi, “Void Avoidance in Three-Dimensional Mobile Underwater Sensor Networks,” Proceedings of WASA, pp. 305-314, 2009.
  • H. Yan, Z. Shi, and Y. Fei, “Efficient Implementation of Elliptic Curve Cryptography on DSP for Underwater Sensor Networks,” Proceedings of ODES 2009, pp. 7-15, March 2009.
  • S. Wang, F. Zhang, J. Dai, Z. Shi, L, Wang, “Making Register File Resistant to Power Analysis Attacks,” Proceedings of ICCD 2008, October 2008.
  • H. Yan, Z. Shi, and J. Cui, “DBR: Depth-based routing for underwater sensor networks,” Proceedings of IFIP Networking 2008, pp. 72-86, May 2008.
  • F. Zhang and Z. Shi, “An Efficient Window-Based Countermeasure to Power Analysis of ECC Algorithms,” Proceedings of International Conference on Information Technology: New Generations (ITNG 2008), pp. 120-126, April 2008.
  • F. Zhang, Z. Shi, and B. Wang, “Chord-based Key Establishment Schemes for Sensor Networks,” Proceedings of International Conference on Information Technology: New Generations (ITNG 2008), pp. 731-737, April 2008.
  • H. Lin, X. Guan, Y. Fei, and Z. Shi, “Compiler-directed Architecture Support for Program Code Integrity Monitoring in Application-specific Instruction Set Processors,” Proceedings of ICCD 2007, pp. 187-193October 2007.
  • H. Yan, S. Zhou, Z. Shi, and B. Li, “A DSP implementation of  OFDM acoustic modem,” Proceedings of The Second ACM International Workshop on UnderWaterNetworks (WUWNET), pp. 89-92, September 2007.
  • Y. Fei and Z. Shi, “Microarchitectural support for program code integrity monitoring in application-specific instruction set processors,” Proceedings of DATE 2007, pp. 815-820, April 2007.
  • F. Zhang and Z. Shi, “Power analysis attacks on ECC randomized automata,” Proceedings of ITNG 2007, pp. 900-901, April 2007.
  • Y. Fei and Z. Shi, “Embedding program code integrity monitoring in application-specific instruction set processors,” Proceedings of BARC 2007, pp. 77-82, February 2007.
  • Z. J. Shi and F. Zhang, “New attacks on randomized ECC algorithms,” Proceedings of EITC 2006, pp. 22-25, August 2006.
  • H. Yan and Z. Shi, “Studying software implementations of Elliptic Curve Cryptography,” Proceedings of ITNG 2006, pp. 78-83, April 2006.
  • Z. Shi and Y. Fei, “Exploring architectural challenges in scalable underwater wireless sensor networks,” Proceedings of Annual Boston Area Computer Architecture Workshop (BARC) 2006, pp. 38-42, February 2006.
  • Z. J. Shi, “Subword permutations with MIX instructions,” Proceedings of 39th Asilomar Conference on Signals, Systems, and Computers, pp. 1637-1641, November 2005.
  • Y. Hilewitz, Z. J. Shi, and R. B. Lee, Comparing Fast Implementations of Bit Permutation Instructions, Proceedings of the 38th Annual Asilomar Conference on Signals, Systems, and Computers, pp. 1856 – 1863, November 2004.
  • R. B. Lee, X. Yang, and Z. J. Shi, Validating Word-oriented Processors for Bit and Multi-Word Operations, Proceedings of the Asia-Pacific Computer Systems Architecture Conference (ACSAC), pp. 473-488, September 2004.
  • R. B. Lee, R. L. Rivest, M. J. B. Robshaw, Z. J. Shi, and Y. L. Yin, “On permutation operations in cipher design,” Proceedings of the International Conference on Information Technology (ITCC), vol. 2, pp. 569-577, April 2004.
  • Z. J. Shi and R. B. Lee, “Implementation complexity of bit permutation instructions,” Proceedings of the Asilomar Conference on Signals, Systems, and Computers, pp. 879-886, November 2003 (Nominated for Best Student Paper Award).
  • J. P. McGregor, D. K. Karig, Z. J. Shi, and R. B. Lee, “A Processor architecture defense against buffer overflow attacks,” Proceedings of the IEEE International Conference on Information Technology: Research and Education (ITRE 2003), pp. 243-250, August 2003 (Best Student Paper Award).
  • Z. Shi, X. Yang and R. B. Lee, “Arbitrary bit permutations in one or two cycles,” Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2003), pp. 237-247, June 2003.
  • R. B. Lee, D. K. Karig, J. P. McGregor, and Z. Shi, “Enlisting hardware architecture to thwart malicious code injection,” Proceedings of the International Conference on Security in Pervasive Computing (SPC-2003), LNCS 2802, pp. 237-252, Springer Verlag, March 2003.
  • Z. Shi and R. B. Lee, “Subword sorting with versatile permutation instructions,” Proceedings of the International Conference on Computer Design (ICCD 2002), pp. 234-241, September 2002.
  • R. B. Lee, Z. Shi, and X. Yang, “How a processor can permute n bits in O(1) cycles,” Proceedings of Hot Chips 14 – A Symposium on High Performance Chips, August 2002.
  • R. B. Lee, A. M. Fiskiran, Z. Shi, and X. Yang, “Refining instruction set architecture for high-performance multimedia processing in constrained environments,” Proceedings of the 13th International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2002), pp. 253-264, July 2002.
  • Z. Shi and R. B. Lee, “Bit permutation instructions for accelerating software cryptography,” Proceedings of the IEEE International Conference on Application-Specific Systems, Architectures and Processors (ASAP 2000), pp. 138-148, July 2000.

Posters and demos

  • Evan Faulkner, Zelin Yun, Shengli Zhou, Zhijie Shi, Song Han, and Georgios Giannakis, “An Advanced GNU-Radio Receiver of IEEE 802.15.4 OQPSK Physical Layer”, poster presentation in the 10th New England Workshop on Software Defined Radio (NEWSDR), 2020.

Book chapters

  • R. B. Lee, R. L. Rivest, M. J. B. Robshaw, Z. J. Shi, and Y. L. Yin, “Permutation operations in block ciphers”, accepted for publication in Embedded Cryptographic Hardware: Design and Security, Nadia Nedjah and Luiza de Macedo Mourelle, eds., Nova Science Publishers, NY, USA, ISBN 1-59454-145-0, February 2005.
  • Z. Zhou, S. Ibrahim, H. Yan, J. Cui, R. Ammar, and Z. Shi, Enhancing underwater acoustic sensor networks using surface radios: issues, challenges and solutions. Chapter in Sensor Networks: Where Theory Meets Practice, (Gianluigi Ferrari, ed), Springer, pp. 283-307, March 2010.
  • Z. Shi, B. Wang, F. Zhang, CBKE: Chord-based Key Establishment Schemes for Wireless Sensor Networks, Chapter in Handbook on Sensor Networks, (Xiao, Chen and Li, eds.), pp.  399-418, World Scientific Publishing Company, August 2010.
  • Z. Shi, C. Ma, J. Cote, and B. Wang, “Hardware implementation of hash functions,” Chapter in Introduction to Hardware Security and Trust, (Tehranipoor and Wang, eds.), July 2011.

Updated in May 2020.