Publications

(2024). Cryptographic Memory Tagging: Towards Stateless Integrity. Hardware and Architectural Support for Security and Privacy (HASP).

PDF DOI

(2024). Memory Tagging using Cryptographic Memory Integrity on Commodity x86 CPUs (runner-up for distinguished paper award 🏆). European Symposium on Security and Privacy (Euro S&P).

PDF

(2024). Hardware-Assisted Fault Isolation: Going Beyond the Limits of Software-Based Sandboxing (top picks 🏆). IEEE Micro Top Picks 2024.

DOI

(2023). MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware. Security and Cryptography (SECRYPT).

DOI

(2023). EC-CFI: Control-Flow Integrity via Code Encryption Counteracting Fault Attacks. Hardware Oriented Security and Trust (HOST).

DOI

(2023). Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI (distinguished paper award, Intel Hardware Security Academic Award honorable mention 🏆). Architectural Support for Programming Languages and Operating Systems (ASPLOS).

PDF Video DOI

(2022). Segue & ColorGuard: Optimizing SFI Performance and Scalability on Modern x86. Programming Languages and Analysis for Security (PLAS).

PDF

(2022). Isolation without Taxation: Near-Zero-Cost Transitions for WebAssembly and SFI. Principles of Programming Languages (POPL).

PDF Project Video DOI

(2021). Cryptographic Capability Computing. MICRO.

DOI

(2021). The Endokernel: Fast, Secure, and Programmable Subprocess Virtualization. arXiv.

PDF

(2021). Isolation Without Taxation: Near Zero Cost Transitions for SFI. Foundations of Computer Security (FCS).

PDF Project

(2015). Network-on-Chip Firewall: Countering Defective and Malicious System-on-Chip Hardware. Logic, Rewriting, and Concurrency (LRC).

PDF DOI

(2014). Power-Based Diagnosis of Node Silence in Remote High-End Sensing Systems. ACM Transactions on Sensor Networks (ToSN).

PDF DOI

(2014). Protecting Sensor Data from Malware Attacks (pages 178-197). Intel Technology Journal (ITJ).

PDF

(2012). Cumulative Attestation Kernels for Embedded Systems. IEEE Transactions on Smart Grid (ToSG).

PDF DOI

(2011). Reliable telemetry in white spaces using remote attestation. Annual Computer Security Applications Conference (ACSAC).

PDF Slides DOI

(2010). Diagnostic Powertracing for Sensor Node Failure Analysis. Information Processing in Sensor Networks (IPSN).

PDF DOI

(2009). Sh@re: Negotiated audit in social networks. Systems, Man and Cybernetics (SMC).

PDF DOI

(2009). Cumulative Attestation Kernels for Embedded Systems. European Symposium on Research in Computer Security (ESORICS).

PDF Slides DOI

(2009). Collaborative Recommender Systems for Building Automation. Hawaii International Conference on System Sciences (HICSS).

PDF Slides DOI

(2008). An Integrated Architecture for Demand Response Communications and Control (best paper award 🏆). Hawaii International Conference on System Sciences (HICSS).

PDF Slides DOI

(2007). Supporting Emergency-Response by Retasking Network Infrastructures. HotNets.

PDF Slides

(2007). PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. Symposium on Access Control Models and Technologies (SACMAT).

PDF Slides DOI

(2007). Unified Architecture for Large-Scale Attested Metering. Hawaii International Conference on System Sciences (HICSS).

PDF Slides DOI

(2006). Acoustic Surveillance of Physically Unmodified PCs. Security and Management (SAM).

PDF Slides

(2004). Comprehensive message control and assurance with the secure email transport protocol. Electro/Information Technology (EIT).

DOI

(2004). Abstracting Low-Level Network Programming With ACE, a Pattern-Oriented Network Programming Framework. Software Engineering Research and Practice (SERP).

PDF