2023 |
KVSEV: A Secure In-Memory Key-Value Store with Secure Encrypted Virtualization.
ACM Symposium on Cloud Computing (SoCC). |
|
Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service.
International Conference on Computer-Aided Design (ICCAD). |
|
Protecting Kernel Code integrity with PMP on RISC-V.
World Conference on Information Security Applications (WISA). |
|
Trust: A Compilation Framework for In-process Isolation to Protect Safe Rust against Untrusted Code.
USENIX Security Symposium (Security). |
|
Kernel Code Integrity Protection at the Physical Address Level on RISC-V.
IEEE Access (Access). |
|
Ambassy: A Runtime Framework to Delegate Trusted Applications in an ARM/FPGA Hybrid System.
IEEE Transactions on Mobile Computing (TMC). |
2022 |
Accelerating N-bit Operations over TFHE on Commodity CPU-FPGA.
International Conference on Computer-Aided Design (ICCAD). |
|
Precise Extraction of Deep Learning Models via Side-Channel Attacks on Edge/Endpoint Devices.
European Symposium on Research in Computer Security (ESORICS). |
|
XtenStore: Extensible Secure In-memory Key-Value Store on a Hybrid x86-FPGA System.
Design, Automation & Test in Europe (DATE). |
|
A Log-Structured Merge Tree-aware Message Authentication Scheme for Persistent Key-Value Stores.
USENIX Conference on File and Storage Technologies (FAST). |
2019 |
libmpk: Software Abstraction for Intel Memory Protection Keys (Intel MPK).
USENIX Annual Technical Conference (ATC). |
|
Fuzzing File Systems via Two-Dimensional Input Space Exploration.
IEEE Symposium on Security and Privacy "Oakland" (SP). |
|
KI-Mon ARM: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
IEEE Transactions on Dependable and Secure Computing (TDSC). |
2018 |
Hardware-Assisted Randomization of Data.
International Symposium on Research in Attacks, Intrusions and Defenses (RAID). {***}: joint first authors, contributted equally. |
2017 |
Architectural Supports to Protect OS Kernels from Code-Injection Attacks and Their Applications.
ACM Transactions on Design Automation of Electronic Systems (TODAES). |
|
Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping.
IEEE Transactions on Dependable and Secure Computing (TDSC). {***}: co-first author. |
2016 |
Architectural Supports to Protect OS Kernels from Code-Injection Attacks.
Hardware and Architectural Support for Security and Privacy (HASP). |
|
HDFI: Hardware-Assisted Data-Flow Isolation.
IEEE Symposium on Security and Privacy "Oakland" (SP). |
2015 |
Extrax: Security Extension to Extract Cache Resident Information for Snoop-based External Monitors.
Design, Automation \& Test in Europe (DATE). |
|
Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors.
Journal of Semiconductor Technology and Science (JSTS). |
2013 |
KI-Mon: A Hardware-assisted Event-triggered Monitoring Platform for Mutable Kernel Object.
USENIX Security Symposium (Security). |
2012 |
Vigilare: Toward Snoop-based Kernel integrity Monitor.
ACM Conference on Computer and Communications Security (CCS). |