My research area is computer security. Specifically, my interests include systems security, program analysis for security, virtualization, trusted computing, and access control. I have published over 130 peer-reviewed papers on these subjects, some of which are available via DBLP and Google Scholar.

My work has been funded by the National Science Foundation ( CNS-0627551, CNS-0721579, CNS-0905343, CNS-0931914, CNS-1117692, CNS-1408880, CNS-1801534, and CNS-1816282 ), Defense Advanced Research Projects Agency, Air Force Research Lab, Army Research Lab, Office of Naval Research, Air Force Office of Scientific Research, and a number of industrial sponsors, including HP Labs, IBM Research, Samsung, and Applied Communication Sciences. Their support is gratefully acknowledged.

See My Publications

Current Research Highlights

Software Security

Recent research in software security has explored methods for automated software patching from safety properties at the 2019 IEEE S&P, automated exploit generation against strong defenses at the 2018 ACM CCS, automated privilege separation accounting for pointers at the 2017 ACM CCS. Also, see papers on exploiting access control in provenance in ACM TOIT (2017), intrusion detection for long attack paths in ACM TOPS (2017), and securing CFI enforcement in 2017 NDSS.

Mobile Security

Research in mobile systems security has focused on two main problems: (1) protecting users from apps that misuse mobile device sensors, including papers in 2019 USENIX Security Symposium, in 2017 USENIX Security Symposium and 2015 ACSAC and (2) providing a trusted computing base for mobile systems and critical apps, including papers in 2019 IEEE TDSC and 2017 MobiSys. Also, see TrustZone Sprobes paper for a method to prevent kernel code injection.

Systems Security

Research in systems security has focused on two main problems: (1) cloud systems security, including papers on security namespaces for container systems in 2018 USENIX Security and DIFC for cloud systems in 2016 ACSAC and (2) CFI enforcement mechanisms for kernels and userspace, including papers in 2017 ASPLOS and 2016 IEEE Euro S&P. See also the paper on hardware-based shadow stack enforcement 2019 DATE and the mobile security platform papers.