Zhang<img alt="" src="/Profiles/PublishingImages/Ning%20Zhang%202018.jpeg?RenditionID=6" style="BORDER:0px solid;" />Assistant ProfessorNing Zhang - Computer Science & Engineering - ​Building provable security protection in mission-critical systems<p>​PhD, Virginia Polytechnic Institute and State University, 2016<br/>MS, Worcester Polytechnic Institute, 2011<br/>BS, MS, University of Massachusetts Amherst, 2007<br/></p><p> <a href=""> <img src="/Profiles/PublishingImages/gscholar.png" alt="" style="margin: 0px 0px -5px;"/> Google Scholar</a></p><p> <strong>Affiliations</strong><br/></p><ul style="text-align: left;"><li> <a href="" style="font-size: 0.9em;">Center for Trustworthy AI in CPS</a><br/></li></ul><p>​Assistant Professor<br/></p><p>​<span style="color: #666666; font-family: "libre baskerville", "times new roman", serif; font-size: 1.25em;">Research</span></p><p>Professor Zhang's research focus is system security, which lies at the intersection of security, computer architecture and programming language. He is particularly interested in secure software/hardware systems, side-channel analysis, malware and digital forensics. He is also interested in developing new methods to automatically discover and mitigate system vulnerabilities.</p><h3>Biography<br/></h3><p>Professor Zhang joined the Department of Computer Science & Engineering at Washington University in Fall 2018. Prior to that, he was a principal cyber engineer/researcher and technical lead at Cyber Security Innovations of Raytheon. Throughout his eleven-year career at Raytheon, he has worked to protect various critical networked and cyber-physical infrastructures. <br/></p><img alt="" src="/Profiles/ResearchImages/N-Zhang%20research.jpg?RenditionID=13" style="BORDER:0px solid;" /><p>314-935-6576<br/><a href="" style="text-align: center; background-color: #ffffff;"></a><br/><span style="text-align: center; color: #222222;">Jolley Hall, Room 206​</span></p><p></p><div class="ms-rtestate-read ms-rte-wpbox" contenteditable="false"><div class="ms-rtestate-notify ms-rtestate-read a5d26d6b-41eb-4b6f-81d8-c0a54ba3dd4f" id="div_a5d26d6b-41eb-4b6f-81d8-c0a54ba3dd4f" unselectable="on"></div><div id="vid_a5d26d6b-41eb-4b6f-81d8-c0a54ba3dd4f" unselectable="on" style="display: none;"></div></div>




‘Surfing attack’ hacks Siri, Google with ultrasonic waves‘Surfing attack’ hacks Siri, Google with ultrasonic waves
Giving users a handle on their data users a handle on their data