Publications
Enforcing Low-Cost Security for ARM Permalink
Ph.D. Dissertation, University of Rochester, September 2023
InversOS: Efficient Control-Flow Protection for AArch64 Applications with Privilege Inversion Permalink
Published in arXiv preprint arXiv:2304.08717, April 2023
Randezvous: Making Randomization Effective on MCUs Permalink
Published in Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC '22), December 2022
Holistic Control-Flow Protection on Real-Time Embedded Systems with Kage Permalink
Published in Proceedings of the 31st USENIX Security Symposium (Security '22), August 2022
Fast Execute-Only Memory for Embedded Systems Permalink
Published in Proceedings of the 2020 IEEE Secure Development Conference (SecDev '20), September 2020
Silhouette: Efficient Protected Shadow Stacks for Embedded Systems Permalink
Published in Proceedings of the 29th USENIX Security Symposium (Security '20), August 2020
Restricting Control Flow During Speculative Execution with Venkman Permalink
Published in arXiv preprint arXiv:1903.10651, March 2019
POSTER: Restricting Control Flow During Speculative Execution Permalink
Published in Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18), October 2018
Shielding Software from Privileged Side-Channel Attacks Permalink
Published in Proceedings of the 27th USENIX Security Symposium (Security '18), August 2018
Spectres, Virtual Ghosts, and Hardware Support Permalink
Published in Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP '18), June 2018
Embedding of Hypercube into Cylinder Permalink
Published in arXiv preprint arXiv:1511.07932, November 2015