research

We study system and network security to make user data secure and system reliable and resilient.

Data-driven Security Analysis
Threat Identification

We identify emerging security threats through vulnerability discovery and side-channel analysis, including risks introduced by modern architectures such as AI accelerators and other emerging computing platforms.

Protocol Development and Optimization
Threat Mitigation & Enforcement

We design and implement practical defense mechanisms, including trusted execution environments (TEEs) and secure system designs, to enforce security guarantees in both networked and system-level infrastructures.

Threat Mitigation
Security Evaluation

We perform systematic security analysis of networked systems using techniques such as dynamic analysis and fuzzing to uncover vulnerabilities and evaluate the robustness of real-world software and protocols.