Wenchao Zhou

Assistant Professor

St. Mary's Hall, Room 342B
3700 Reservoir Rd NW, Washington, DC 20057

email: wzhou [at] cs [dot] georgetown [dot] edu
phone: +1 (202) 687-4652

Selective publications (a full list of my publications is available here):
2017

  • Private Network Provenance
    Yuankai Zhang, Adam O’Neil, Micah Sherr, and Wenchao Zhou
    In the 43rd International Conference on Very Large Databases (VLDB), Munich, Germany, August 2017.

  • Distributed Provenance Compression [paper]
    Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Anupam Alur, Limin Jia, Boon Thau Loo, and Wenchao Zhou
    In the 36th ACM SIGMOD International Conference on Management of Data (SIGMOD), Chicago, IL, May 2017.

  • One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics [paper]
    Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 12th European Conference on Computer Systems (EuroSys), Belgrade, Serbia, April 2017.

  • Automated Bug Removal for Software-Defined Networks [paper]
    Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 14th USENIX Symposium on Networked Systems (NSDI), Boston, MA, March 2017.

  • Data Provenance at Internet Scale: Architecture, Experiences, and the Road Ahead [paper]
    Ang Chen, Yang Wu, Andreas Haeberlen, Boon Thau Loo, and Wenchao Zhou
    In the 8th Biennial Conference on Innovative Data Systems Research (CIDR), Chaminade, CA, January 2017.

  • 2016

  • The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance [paper]
    Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 2016 ACM Conference on Special Interest Group on Data Communication (SIGCOMM), Florianopolis, Brazil, August 2016.

  • Hidden Voice Commands [paper]
    Nicholas Carlini, Pratyush Mishra, Tavish Vaidya, Yuankai Zhang, Micah Sherr, Clay Shields, David Wagner, and Wenchao Zhou
    In the 24th USENIX Security Symposium (Security), Austin, TX, August 2016.

  • Data-Plane Defenses against Routing Attacks on Tor [paper]
    Henry Tan, Micah Sherr, and Wenchao Zhou
    In the Proceedings on Privacy Enhancing Technologies (PoPETs) 2016(4), 2016.

  • 2015

  • Automated Verification of Safety Properties of Declarative Networking Programs [paper]
    Chen Chen, Lay Kuan Loh, Limin Jia, Wenchao Zhou, and Boon Thau Loo
    In the 17th International Symposium on Principles and Practice of Declarative Programming (PPDP), Siena, Italy, July 2015.

  • The (Surprising) Computational Power of the SDN Data Plane [paper]
    Calvin Newport, and Wenchao Zhou
    In the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, April 2015.

  • 2014

  • Detecting Covert Timing Channels with Time-Deterministic Replay [paper]
    Ang Chen, W. Brad Moore, Hanjun Xiao, Andreas Haeberlen, Linh Thi Xuan Phan, Micah Sherr, and Wenchao Zhou In the 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI), Broomfield, CO, October 2014.

  • A Program Logic for Verifying Secure Routing Protocols [paper]
    Chen Chen, Limin Jia, Hao Xu, Cheng Luo, Wenchao Zhou, Boon Thau Loo
    In the 34th International Conference on Formal Techniques for Distributed Objects, Components and Systems (FORTE), Berlin, Germany, June 2014.

  • Supporting Distributed Feed-Following Apps over Edge Devices [paper]
    Badrish Chandramouli, Suman Nath, and Wenchao Zhou
    In the 40th International Conference on Very Large Databases (VLDB), Hangzhou, China, August 2014.

  • Diagnosing Missing Events in Distributed Systems with Negative Provenance [paper]
    Yang Wu, Mingchen Zhao, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo
    In the 2014 ACM Conference on Special Interest Group on Data Communication (SIGCOMM) , Chicago, IL, August 2014.

  • 2013

  • Validating Web Content with Senser [paper]
    Jordan Wilberding, Andrew Yates, Micah Sherr, and Wenchao Zhou
    In the 29th Annual Computer Security Applications Conference (ACSAC), New Orleans, LA, December 2013.

  • Distributed Time-aware Provenance [paper]
    Wenchao Zhou, Suyog Mapara, Yiqing Ren, Yang Li, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, Micah Sherr
    To appear in the International Conference on Very Large Data Bases (VLDB), Riva del Garda, Trento, Aug 2013.
  • 2012

  • Declarative Secure Distributed Information Systems [link]
    Wenchao Zhou, Tao Tao, Boon Thau Loo, Yun Mao
    In Computer Languages, Systems & Structures (COMLAN), Elsevier Publishing, 2012.

  • Private and Verifiable Interdomain Routing Decisions [paper]
    Mingchen Zhao, Wenchao Zhou, Alexander J.T. Gurney, Andreas Haeberlen, Micah Sherr, Boon Thau Loo
    In the ACM SIGCOMM Conference on Data Communication (SIGCOMM), Helsinki, Finland, Aug 2012.

  • RACE: Real-time Applications over Cloud-Edge [paper]
    Badrish Chandramouli, Joris Claessens, Suman Nath, Ivo Santos, and Wenchao Zhou
    In the ACM International Conference on Management of Data (SIGMOD) - demo, Scottsdale, Arizona, May, 2012.

  • FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing [paper]
    Anduo Wang, Limin Jia, Wenchao Zhou, Yiqing Ren, Boon Thau Loo, Jennifer Rexford, Vivek Nigam, Andre Scedrov, and Carolyn L. Talcott.
    In the IEEE/ACM Transactions on Networking (ToN), 2012.
  • 2011

  • Having your Cake and Eating it too: Routing Security with Privacy Protections [paper]
    Alexander J. T. Gurney, Andreas Haeberlen, Wenchao Zhou, Micah Sherr, and Boon Thau Loo
    In the ACM Workshop on Hot Topics in Networks (HotNets-X), Cambridge, MA, Nov 2011.

  • Secure Network Provenance [paper] [talk]
    Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr
    In the ACM Symposium on Operating Systems Principles (SOSP), Cascais, Portugal, Oct 2011.

  • FSR: Formal Analysis and Implementation Toolkit for Safe Inter-domain Routing [paper] [talk]
    Wenchao Zhou, Yiqing Ren, Anduo Wang, Limin Jia, Alexander J.T. Gurney, Boon Thau Loo, and Jennifer Rexford
    In the ACM SIGCOMM Conference on Data Communication (SIGCOMM) - demo, Toronto, Canada, Aug, 2011.
    Runner-up for the ACM Student Research Competition at SIGCOMM'11.

  • A Batch of PNUTS: Experiences Connecting Cloud Batch and Serving Systems [paper]
    Adam Silberstein, Russell Sears, Wenchao Zhou, and Brian F. Cooper
    In the ACM International Conference on Management of Data (SIGMOD), Athens, Greece, Jun 2011.

  • NetTrails: A Platform for Provenance Maintenance and Querying in Distributed Systems [paper]
    Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, Andreas Haeberlen, Zachary Ives, Boon Thau Loo, and Micah Sherr
    In the ACM SIGMOD International Conference on Management of Data (SIGMOD) - demo, Athens, Greece, Jun 2011.
  • 2010

  • Efficient Querying and Maintenance of Network Provenance at Internet-Scale [paper] [talk]
    Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, Boon Thau Loo, and Yun Mao
    In the ACM International Conference on Management of Data (SIGMOD), Indianapolis, IN, Jun 2010.

  • A3: An Extensible Platform for Application-Aware Anonymity [paper]
    Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou and Boon Thau Loo
    In the Annual Network & Distributed System Security Symposium (NDSS), San Diego, CA, Feb 2010.

  • Maintaining Recursive Views of Regions and Connectivity in Networks [paper]
    Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary Ives, and Boon Thau Loo
    In IEEE Transactions of Knowledge and Data Engineering (TKDE) Journal, 2010.
    Special Issue on Best Papers of ICDE 2009.
  • 2009

  • Unified Declarative Platform for Secure Networked Information Systems [paper] [talk]
    Wenchao Zhou, Yun Mao, Boon Thau Loo, and Martín Abadi
    In the International Conference on Data Engineering (ICDE), Shanghai, China, Apr 2009.

  • Recursive Computation of Regions and Connectivity in Networks [paper]
    Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary G. Ives, and Boon Thau Loo
    In the International Conference on Data Engineering (ICDE), Shanghai, China, Apr 2009.
    A longer version appears in IEEE Transactions of Knowledge and Data Engineering (TKDE) Journal, 2010.
    Best Paper Award at ICDE'09.

  • Declarative Reconfigurable Trust Management [paper] [talk]
    William R. Marczak, David Zook, Wenchao Zhou, Molham Aref, and Boon Thau Loo
    In the Biennial Conference on Innovative Data Systems Research (CIDR), Pacific Grove, CA, Jan 2009.