research
We study system and network security to make user data secure and system reliable and resilient.
Threat Identification
We identify emerging security threats through vulnerability discovery and side-channel analysis, including risks introduced by modern architectures such as AI accelerators and other emerging computing platforms.
Threat Mitigation & Enforcement
We design and implement practical defense mechanisms, including trusted execution environments (TEEs) and secure system designs, to enforce security guarantees in both networked and system-level infrastructures.
Security Evaluation
We perform systematic security analysis of networked systems using techniques such as dynamic analysis and fuzzing to uncover vulnerabilities and evaluate the robustness of real-world software and protocols.