Published multiple papers such as 'Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling', 'Bridge the Future: High-Performance Networks in Confidential VMs without Trusted I/O devices', 'SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments', etc.; Some of these papers have been accepted by top conferences like ACM ASIACCS'24, USENIX Security Symposium'23, IEEE Symposium on Security and Privacy'22; Relevant work has also led to security bulletins from AMD and CVE assignments, e.g., CVE-2023-20575 and CVE-2021-46744.
Research Experience
Assistant Professor at the Thomas Lord Department of Computer Science, University of Southern California; Postdoc researcher at CSAIL, MIT from 2022 to 2024, working with Prof. Mengjia Yan; Leads the SEPT Lab (Security, Privacy, and Trust) focusing on cutting-edge research in systems and security.
Education
Ph.D. in Computer Science and Engineering from The Ohio State University in 2022, advised by Prof. Yinqian Zhang; Bachelor's degree in Electronic Engineering from Shanghai Jiao Tong University.
Background
Research Interests: Uncovering, Understanding, and Defending Against System and Hardware Vulnerabilities, including cloud system security, CPU security, GPU security, and AI system security; Software-Hardware Co-Design for Secure and Efficient Devices and Systems. Related Research Keywords: Side-channel attacks, Confidential computing, Trusted Execution Environment (TEE), micro-architectural attacks, CPU and GPU security and architecture, program analysis, reverse engineering, etc.
Miscellany
Actively looking for motivated PhD, MS, and undergraduate students passionate about systems and security to join the SEPT Lab.