research

Our research focuses on security and privacy across the computer systems stack — from microarchitecture and operating systems to the cloud. We combine offensive security research (discovering new attacks) with defensive techniques (building systems resilient to those attacks).


Microarchitectural Side-Channel Attacks

Modern CPUs and GPUs leak information through timing, caches, branch predictors, prefetchers, and thermal behavior. We develop new side-channel and transient-execution attacks that break isolation in commodity hardware and propose architectural or software-level mitigations.

Representative works:

  • SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple SiliconACM CCS 2024 / Black Hat Europe 2024
  • DevIOus: Device-Driven Side-Channel Attacks on the IOMMUIEEE S&P 2023
  • Unveiling Hardware-based Data Prefetcher, a Hidden Source of Information LeakageACM CCS 2018
  • T-Time: A Fine-grained Timing-based Controlled-Channel Attack against Intel TDXESORICS 2025

System Security

We look for security weaknesses in operating system kernels, system-call filtering, trusted execution environments (Intel SGX/TDX), and device drivers, and we design principled defenses.

Representative works:

  • MimicCall: Bypassing System Call Filters via Kernel Function RedundancyACSAC 2025
  • SysDiver: Lightweight and Fast Static Analysis for Windows Kernel DriversASIACCS 2026
  • Vulnerable Intel GPU Context: Prohibit Complete Context Restore by Modifying Kernel DriverASIACCS 2025

Cloud and Container Security

As workloads move to shared infrastructure, we study how memory deduplication, co-location, and container scheduling can be abused, and how to strengthen isolation in cloud and Kubernetes environments.

Representative works:

  • PodBeater: Exploiting Multi-Value Affinity for Efficient Co-Location Attacks in KubernetesWISA 2025
  • S-ZAC: Hardening Access Control of Service Mesh using Intel SGX for Zero Trust in CloudElectronics 2024
  • Exploiting Memory Page Management in KSM for Remote Memory Deduplication AttackWISA 2023
  • Secure Data Deduplication with Dynamic Ownership Management in Cloud StorageIEEE TSC 2020

Network Security

We analyze protocol-level vulnerabilities in TLS, HTTP, and IPsec, and study side-channel leakage in virtualized network functions.

Representative works:

  • PathFault: Automated Exploit Generator for Web Services via HTTP Message Parser DiscrepanciesICISC 2025
  • Return of Version Downgrade Attack in the Era of TLS 1.3ACM CoNEXT 2020
  • Inferring Firewall Rules by Cache Side-channel Analysis in Network Function VirtualizationIEEE INFOCOM 2020

Binary Analysis and Fuzzing

Our group builds static and dynamic analyzers, fuzzers, and vulnerability-discovery tools for firmware, embedded systems, and kernel-space software.

Representative works:

  • Empirical Study on BMC Firmware Vulnerabilities: Root Causes and Architectural InsightsICOIN 2026
  • FuzzyBin: Enhanced Border Binary Identification by Leveraging Fuzzy Hashing AlgorithmsIEEE Access 2025
  • Fuzzing of Embedded Systems: A SurveyACM Computing Surveys 2023

Visit the publications page for the full list of our research outputs.