Ph.D. Candidate,
School of Cyber Science and Engineering,
Wuhan University, China
[Email], [GitHub], [Google Scholar], [DBLP], [ORCID], [WoS], [Scopus]
I am currently a third-year Ph.D. student at the School of Cyber Science and Engineering, Wuhan University, under the guidance of Prof. Ming Tang. I earned my B.S. degree from School of Software, Shandong University in 2021. My research focuses on hardware security, microarchitecture security, and system security. I have published several papers in top-tier conferences and journals, including IEEE HPCA, AsiaCCS, ACM TACO, and IEEE IoT-J. Additionally, I have contributed as a reviewer for several journals.
- 2025.04 - 2025.08:
- Chip Security Engineer Intern at DAMO Academy, Alibaba Group, Hangzhou, China
- [2025.10] I have been awarded the "National Scholarship (博士研究生国家奖学金)".
- [2025.04] I have been awarded the "Lei Jun Computer Breakthrough Scholarship (雷军计算机突破奖学金)" along with Ke Xu and Han Wang.
- [2025.04] Our paper "BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors" has been accepted to AsiaCCS 2025.
- [2025.01] Our paper "Unveiling and Evaluating Vulnerabilities in Branch Predictors via a Three-Step Modeling Methodology" has been accepted to ACM TACO.
- [2024.11] I have been awarded the "National Scholarship (博士研究生国家奖学金)".
- [2023.12] Our paper "Survey of Attack Techniques for Microarchitecture Security Vulnerabilities (微架构安全漏洞攻击技术综述 in Chinese)" has been accepted to Journal of Cryptologic Research (密码学报 in Chinese).
- [2023.10] I have been awarded the "Lei Jun Computer Scholarship (雷军计算机奖学金)".
- [2023.10] Our work published in HPCA 2024 was featured in a news by Wuhan University: "Two papers from Professor Ming Tang's research group have been accepted by IEEE HPCA 2024 (唐明教授课题组两篇论文被IEEE HPCA 2024录用)".
- [2023.10] Our paper "Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities" has been accepted to HPCA 2024.
- [2023.07] Our paper "EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones" has been accepted to IEEE IoT-J.
Quancheng Wang, Ming Tang, Ke Xu, Han Wang
BranchGauge: Modeling and Quantifying Side-Channel Leakage in Randomization-Based Secure Branch Predictors
[AsiaCCS, CCF-C, CORE A] ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2025.
[Paper], [Preprint], [Code], [Slides]
Quancheng Wang, Ming Tang, Ke Xu, Han Wang
Unveiling and Evaluating Vulnerabilities in Branch Predictors via a Three-Step Modeling Methodology
[TACO, CCF-A, JCR Q2] ACM Transactions on Architecture and Code Optimization (TACO), 2025.
[Paper]
Quancheng Wang, Ming Tang, Ke Xu, Han Wang
Modeling, Derivation, and Automated Analysis of Branch Predictor Security Vulnerabilities
[HPCA, CCF-A, CORE A*] IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2024.
[Paper], [Preprint], [Code], [Slides], [Poster], [News]
Quancheng Wang, Ming Tang, Jianming Fu
EavesDroid: Eavesdropping User Behaviors via OS Side-Channels on Smartphones
[IoT-J, CCF-C, JCR Q1] IEEE Internet of Things Journal (IoT-J), 2024.
[Paper], [Preprint], [Code]
Quancheng Wang, Ming Tang
Survey of Attack Techniques for Microarchitecture Security Vulnerabilities (微架构安全漏洞攻击技术综述 in Chinese)
[JCR, CCF-T2] Journal of Cryptologic Research (密码学报 in Chinese), 2024.
[Paper]
Han Wang, Ming Tang, Quancheng Wang, Ke Xu, Yinqian Zhang
ZenLeak: Practical Last-Level Cache Side-Channel Attacks on AMD Zen Processors
[DAC, CCF-A, CORE A] ACM/IEEE Design Automation Conference (DAC), 2025.
[Paper], [AMD Response], [News] Best Paper Award Nominee
Ke Xu, Ming Tang, Quancheng Wang, Han Wang
Microarchitectural Attacks and Mitigations on Retire Resources in Modern Processors
[TC, CCF-A, JCR Q2] IEEE Transactions on Computers (TC), 2025.
[Paper]
Ke Xu, Ming Tang, Quancheng Wang, Han Wang
Exploitation of Security Vulnerability on Retirement
[HPCA, CCF-A, CORE A*] IEEE International Symposium on High-Performance Computer Architecture (HPCA), 2024.
[Paper], [Preprint], [News]
Han Wang, Ming Tang, Ke Xu, Quancheng Wang
Cache Bandwidth Contention Leaks Secrets
[DATE, CCF-B, CORE B] Design, Automation & Test in Europe Conference & Exhibition (DATE), 2024.
[Paper], [Preprint]
Yuzhe Gu, Ming Tang, Quancheng Wang, Han Wang, Haili Ding
One more set: Mitigating conflict-based cache side-channel attacks by extending cache set
[JSA, CCF-B, JCR Q1] Journal of Systems Architecture (JSA), 2023.
[Paper]
Quancheng Wang, Ming Tang, Han Wang, Ke Xu
A Defense Method and System for L1 Data Cache Side-Channel Attacks Based on Backup Cache (基于备份缓存的一级数据缓存侧信道攻击防御方法及系统 in Chinese)
[Patent, Under Review] Patent (in Chinese) CN202311693095.5
[Patent]
Quancheng Wang, Xige Zhang, Han Wang, Yuzhe Gu, Ming Tang
BackCache: Mitigating Contention-Based Cache Timing Attacks by Hiding Cache Line Evictions
[Preprint, Under Review] CoRR, abs/arXiv:2304.10268
[Preprint]
-
Reviewer
- IEEE Internet of Things Journal, IEEE (since 2023)
- International Journal of Information Security, Springer (since 2025)
- The Journal of Supercomputing, Springer (since 2025)
-
Member
- ACM Student Member (Jun 2025 -- May 2026)
- IEEE Graduate Student Member (Jan 2024 -- Dec 2024)
- CCF Student Member (Jul 2024 -- Dec 2024)
I'm an Early 🐤
🌞 Morning 874 commits █████████░░░░░░░░░░░░░░░░ 37.35 %
🌆 Daytime 1021 commits ███████████░░░░░░░░░░░░░░ 43.63 %
🌃 Evening 430 commits █████░░░░░░░░░░░░░░░░░░░░ 18.38 %
🌙 Night 15 commits ░░░░░░░░░░░░░░░░░░░░░░░░░ 00.64 %
📊 This Week I Spent My Time On
💬 Programming Languages:
TeX 19 hrs ███████████████████░░░░░░ 74.03 %
BibTeX 2 hrs 35 mins ███░░░░░░░░░░░░░░░░░░░░░░ 10.10 %
Other 1 hr 8 mins █░░░░░░░░░░░░░░░░░░░░░░░░ 04.42 %
Python 59 mins █░░░░░░░░░░░░░░░░░░░░░░░░ 03.85 %
Text 51 mins █░░░░░░░░░░░░░░░░░░░░░░░░ 03.31 %
🔥 Editors:
VS Code 25 hrs 40 mins █████████████████████████ 100.00 %
💻 Operating System:
Linux 21 hrs 9 mins █████████████████████░░░░ 82.44 %
Mac 4 hrs 30 mins ████░░░░░░░░░░░░░░░░░░░░░ 17.56 %
Last Updated on 15/01/2026 02:09:26 UTC


