Publications
Research papers I've authored or co-authored.
2025
- Agora: Trust Less and Open More in Verification for Confidential ComputingProceedings of the ACM on Programming Languages (OOPSLA 2025)
- BOLT: Bandwidth-Optimized Lightning-Fast Oblivious MapACM Conference on Computer and Communications Security (CCS 2025)
- The Early Bird Catches the Leak: Timing Side Channels in LLM ServingIEEE Transactions on Information Forensics and Security (TIFS 2025)
- AgentArmor: Enforcing Program Analysis on Agent Runtime TracearXiv preprint arXiv:2503.xxxxx
- PICACHV: Formally Verified Data Use Policy Enforcement for Secure Data Analytics34th USENIX Security Symposium (USENIX Security 25)
- LineBreaker: Finding Token-Inconsistency Bugs Using Large Language ModelsProceedings of the 40th IEEE/ACM International Conference on Automated Software Engineering (ASE 2025)
2024
- Disassembling Obfuscated Executables with LLMarXiv preprint arXiv:2407.08924
2023
- A Verified Confidential Computing as a Service Framework for Privacy Preservation32nd USENIX Security Symposium (USENIX Security 23)
2022
- The Evolving Privacy and Security Concerns for Genomic Data Analysis and Sharing as Observed from the iDASH CompetitionJournal of the American Medical Informatics Association, 29(12), 2182–2190
- Robbery on DevOps: Understanding and Mitigating Illicit Cryptomining on Continuous Integration Service Platforms2022 IEEE Symposium on Security and Privacy (S&P)
2021
- Understanding TEE Containers, Easy to Use? Hard to TrustarXiv preprint arXiv:2109.01923
- Practical and Efficient in-Enclave Verification of Privacy Compliance2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
- Trust Beyond Border: Lightweight, Verifiable User Isolation for Protecting In-Enclave ServicesIEEE Transactions on Dependable and Secure Computing
- HySec-Flow: Privacy-Preserving Genomic Computing with SGX-based Big-Data Analytics Framework2021 IEEE 14th International Conference on Cloud Computing (CLOUD)
2020
- Confidential Attestation: Efficient In-Enclave Verification of Privacy Policy CompliancearXiv preprint arXiv:2009.09028