Wenchao Zhou

Assistant Professor

St. Mary's Hall, Room 342B
3700 Reservoir Rd NW, Washington, DC 20057

email: wzhou [at] cs [dot] georgetown [dot] edu
phone: +1 (202) 687-4652
Peer Reviewed

  • Private Network Provenance
    Yuankai Zhang, Adam O’Neil, Micah Sherr, and Wenchao Zhou
    In the 43rd International Conference on Very Large Databases (VLDB), Munich, Germany, August 2017.

  • A Demonstration of the DeDoS Platform for Defusing Asymmetric DDoS Attacks in Data Centers
    Henri Maxime Demoulin, Tavish Vaidya, Isaac Pedisich, Nik Sultana, Bowen Wang, Jingyu Qian, Yuankai Zhang, Ang Chen, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, and Wenchao Zhou
    In the ACM Conference on Special Interest Group on Data Communication (SIGCOMM), Los Angeles, CA, August 2017.

  • Distributed Provenance Compression [paper]
    Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Anupam Alur, Limin Jia, Boon Thau Loo, and Wenchao Zhou
    In the 36th ACM SIGMOD International Conference on Management of Data (SIGMOD), Chicago, IL, May 2017.

  • One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics [paper]
    Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 12th European Conference on Computer Systems (EuroSys), Belgrade, Serbia, April 2017.

  • Automated Bug Removal for Software-Defined Networks [paper]
    Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 14th USENIX Symposium on Networked Systems (NSDI), Boston, MA, March 2017.

  • Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead [paper]
    Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, and Wenchao Zhou
    In the 8th Biennial Conference on Innovative Data Systems Research (CIDR), Chaminade, CA, January 2017.

  • Dispersing Asymmetric DDoS Attacks with SplitStack [paper]
    Ang Chen, Akshay Sriraman, Tavish Vaidya, Yuankai Zhang, Andreas Haeberlen, Boon Thau Loo, Linh Thi Xuan Phan, Micah Sherr, Clay Shields, and Wenchao Zhou
    In the 15th ACM Workshop on Hot Topics in Networks (HotNets), Atlanta, GA, October 2016.

  • The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance [paper]
    Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 2016 ACM Conference on Special Interest Group on Data Communication (SIGCOMM), Florianopolis, Brazil, August 2016.

  • Hidden Voice Commands [paper]
    Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou
    In the 24th USENIX Security Symposium (Security), Austin, TX, August 2016.

  • Data-Plane Defenses against Routing Attacks on Tor [paper]
    Henry Tan, Micah Sherr, and Wenchao Zhou
    In the Proceedings on Privacy Enhancing Technologies (PoPETs) 2016(4), 2016.

  • Private and Verifiable Interdomain Routing Decisions [paper]
    Mingchen Zhao, Wenchao Zhou, Alexander J. T. Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo
    In IEEE/ACM Transactions on Networks (ToN) 24(2), 2016.

  • Differential Provenance: Better Network Diagnostics with Reference Events [paper]
    Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 14th ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, PA, November 2015.

  • Automated Network Repair with Meta Provenance [paper]
    Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 14th ACM Workshop on Hot Topics in Networks (HotNets), Philadelphia, PA, November 2015.

  • Automated Verification of Safety Properties of Declarative Networking Programs [paper]
    Chen Chen, Lay Kuan Loh, Limin Jia, Wenchao Zhou, and Boon Thau Loo
    In the 17th International Symposium on Principles and Practice of Declarative Programming (PPDP), Siena, Italy, July 2015.

  • The (Surprising) Computational Power of the SDN Data Plane [paper]
    Calvin Newport, and Wenchao Zhou
    In the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, April 2015.

  • A Program Logic for Verifying Secure Routing Protocols [paper]
    Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo
    In Logical Methods in Computer Science 11(4), 2015.

  • Detecting Covert Timing Channels with Time-Deterministic Replay [paper]
    Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou In the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, October 2014.

  • Supporting Distributed Feed-Following Apps over Edge Devices [paper]
    Badrish Chandramouli, Suman Nath, and Wenchao Zhou
    In the 40th International Conference on Very Large Databases (VLDB), Hangzhou, China, August 2014.

  • Diagnosing Missing Events in Distributed Systems with Negative Provenance [paper]
    Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 2014 ACM Conference on Special Interest Group on Data Communication (SIGCOMM) , Chicago, IL, August 2014.

  • A Program Logic for Verifying Secure Routing Protocols [paper]
    Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo
    In the 34th International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), Berlin, Germany, June 2014.

  • The Design and Implementation of the A3 Application-Aware Anonymity Platform [paper]
    Micah Sherr, Harjot Gill, Taher Aquil Saeed, Andrew Mao, William R. Marczak, Saravana Soundararajan, Wenchao Zhou, Boon Thau Loo, and Matt Blaze
    In Computer Networks (COMNET) 58, 2014.

  • Validating Web Content with Senser [paper]
    Jordan Wilberding, Andrew Yates, Micah Sherr, and Wenchao Zhou
    In the 29th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, December 2013.

  • Answering Why-Not Queries in Software-Defined Networks with Negative Provenance [paper]
    Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 12th ACM Workshop on Hot Topics in Networks (HotNets), College Park, MD, November 2013.

  • Distributed Time-aware Provenance [paper]
    Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, Micah Sherr
    In the International Conference on Very Large Data Bases (VLDB), Riva del Garda, Trento, Aug 2013.

  • A Formal Framework for Secure Routing Protocols [paper]
    Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, and Boon Thau Loo
    In the International Workshop on Foundations of Computer Security (FCS), New Orleans, LA, June 2013.

  • Using Substructure Mining to Identify Misbehavior in Network Provenance Graphs [paper]
    David DeBoer, Wenchao Zhou, and Lisa Singh
    In the 1st International Workshop on Graph Data Management Experience and Systems (GRADES), New York, NY, June 2013.

  • Declarative Secure Distributed Information Systems [link]
    Wenchao Zhou, Tao Tao, Boon Thau Loo, Yun Mao
    In Computer Languages, Systems & Structures (COMLAN), Elsevier Publishing, 2012.

  • Reduction-based Security Analysis of Internet Routing Protocols [paper]
    Chen Chen, Limin Jia, Boon Thau Loo, Wenchao Zhou
    In the 2nd International Workshop on Rigorous Protocol Engineering (WRiPE), co-located with ICNP 2012, Oct 2012.

  • Private and Verifiable Interdomain Routing Decisions [paper]
    Mingchen Zhao, Wenchao Zhou, Alexander J.T. Gurney, Andreas Haeberlen, Micah Sherr, and Boon Thau Loo
    In the ACM Conference on Data Communication (SIGCOMM), Helsinki, Finland, Aug 2012.

  • RACE: Real-time Applications over Cloud-Edge (demo) [paper]
    Badrish Chandramouli, Joris Claessens, Suman Nath, Ivo Santos, and Wenchao Zhou
    In the ACM International Conference on Management of Data (SIGMOD), Scottsdale, Arizona, May, 2012.

  • FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing [paper]
    Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, and Carolyn L. Talcott.
    In the IEEE/ACM Transactions on Networking (ToN), 2012.

  • Having your Cake and Eating it too: Routing Security with Privacy Protections [paper]
    Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, and Boon Thau Loo
    In the ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MA, Nov 2011.

  • Secure Network Provenance [paper] [talk]
    Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr
    In the ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, Oct 2011.

  • FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing (demo) [paper] [talk]
    Wenchao Zhou, Yiqing Ren, Anduo Wang, Limin Jia, Alexander J.T. Gurney, Boon Thau Loo, and Jennifer Rexford
    In the ACM SIGCOMM Conference on Data Communication (SIGCOMM), Toronto, Canada, Aug, 2011.
    Runner-up for the ACM Student Research Competition at SIGCOMM'11.

  • TAP: Time-aware Provenance for Distributed Systems [paper] [talk]
    Wenchao Zhou, Ling Ding, Andreas Haeberlen, Zachary Ives, and Boon Thau Loo
    In the USENIX Workshop on the Theory and Practice of Provenance (TaPP), Heraklion, Greece, June 2011.

  • A Batch of PNUTS: Experiences Connecting Cloud Batch and Serving Systems [paper]
    Adam Silberstein, Russell Sears, Wenchao Zhou, and Brian F. Cooper
    In the ACM International Conference on Management of Data (SIGMOD), Athens, Greece, Jun 2011.

  • NetTrails: A Platform for Provenance Maintenance and Querying in Distributed Systems (demo) [paper]
    Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, and Micah Sherr
    In the ACM SIGMOD International Conference on Management of Data (SIGMOD), Athens, Greece, Jun 2011.

  • Towards a Data-centric View of Cloud Security [paper] [talk]
    Wenchao Zhou, Micah Sherr, William R. Marczak, Zhuoyao Zhang, Tao Tao, Boon Thau Loo, and Insup Lee
    In the Workshop on Cloud Data Management (CloudDB), in conjunction with CIKM, Toronto, Canada, Oct 2010.

  • Declarative Secure Distributed Systems [paper]
    Wenchao Zhou
    In the International Conference on Very Large Data Bases (VLDB) - PhD workshop, Singapore, Sep 2010.

  • Efficient Querying and Maintenance of Network Provenance at Internet-Scale [paper] [talk]
    Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, and Yun Mao
    In the ACM International Conference on Management of Data (SIGMOD), Indianapolis, IN, Jun 2010.

  • A3: An Extensible Platform for Application-Aware Anonymity [paper]
    Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou and Boon Thau Loo
    In the Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, Feb 2010.

  • Maintaining Recursive Views of Regions and Connectivity in Networks [paper]
    Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary Ives, and Boon Thau Loo
    In IEEE Transactions of Knowledge and Data Engineering (TKDE) Journal, 2010.
    Special Issue on Best Papers of ICDE 2009.

  • DMaC: Distributed Monitoring and Checking [paper] [talk]
    Wenchao Zhou, Oleg Sokolsky, Boon Thau Loo, and Insup Lee
    In the International Workshop on Runtime Verification (RV), Grenoble, France, Jun 2009.

  • Unified Declarative Platform for Secure Networked Information Systems [paper] [talk]
    Wenchao Zhou, Yun Mao, Boon Thau Loo, and Martín Abadi
    In the International Conference on Data Engineering (ICDE), Shanghai, China, Apr 2009.

  • Recursive Computation of Regions and Connectivity in Networks [paper]
    Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary G. Ives, and Boon Thau Loo
    In the International Conference on Data Engineering (ICDE), Shanghai, China, Apr 2009.
    A longer version appears in IEEE Transactions of Knowledge and Data Engineering (TKDE) Journal, 2010.
    Best Paper Award at ICDE'09.

  • Declarative Reconfigurable Trust Management [paper] [talk]
    William R. Marczak, David Zook, Wenchao Zhou, Molham Aref, and Boon Thau Loo
    In the Biennial Conference on Innovative Data Systems Research (CIDR), Pacific Grove, CA, Jan 2009.

  • Provenance-aware Secure Networks [paper] [talk]
    Wenchao Zhou, Eric Cronin, and Boon Thau Loo
    In the Workshop on Networking meets Databases (NetDB), in conjunction with ICDE, Cancun, Mexico, Apr 2008.

  • Non-peer Reviewed

  • Secure Time-aware Provenance in Distributed Systems [paper]
    Wenchao Zhou
    PhD Thesis, University of Pennsylvania, 2012.

  • Privacy-Preserving Collaborative Verification Protocols [paper]
    Andreas Haeberlen, Mingchen Zhao, Wenchao Zhou, Alexander Gurney, Micah Sherr, and Boon Thau Loo
    In the Workshop on Large-Scale Distributed Systems and Middleware (LADIS), in conjunction with PODC, Madeira, Portugal, July 2012.

  • Recent Advances in Declarative Networking [paper]
    Boon Thau Loo, Harjot Gill, Changbin Liu, Yun Mao, William R. Marczak, Micah Sherr, Anduo Wang, and Wenchao Zhou
    In the International Symposium on Practical Aspects of Declarative Languages (PADL), Philadelphia, PA, Jan 2012.

  • Books

  • Declarative Networking (Synthesis Lectures on Data Management) [link]
    Boon Thau Loo, Wenchao Zhou, and M. Tamer Ozsu
    Morgan & Claypool Publishers (Invited).

  • Datalog and Recursive Query Processing (Foundations and Trends in Databases) [link]
    Todd J. Green, Shan Shan Huang, Boon Thau Loo, and Wenchao Zhou
    Now Publishers (Invited).