General Information
Details
In general interested in systems security, in particular:
1. how to use/create hardware features for improving security
2. identifying new attack vectors in new applications/features
3. identifying what security tasks LLMs are good at
No. interest.
Y. Fratantonio, C. Qian, S. P. Chung and W. Lee, "Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop," 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2017, pp. 1041-1057, doi: 10.1109/SP.2017.39. keywords: {Androids;Humanoid robots;Security;Google;Feedback loop;Facebook;Pins},
Yagemann, C., Pruett, M., Chung, S. P., Bittick, K., Saltaformaggio, B., & Lee, W. (2021). ARCUS: Symbolic root cause analysis of exploits in production systems. In Proceedings of the 30th USENIX Security Symposium (USENIX Security ’21) (pp. 1989–2006). USENIX Association.
Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R. Harris, Taesoo Kim, and Wenke Lee. 2018. Enforcing Unique Code Target Property for Control-Flow Integrity. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18). Association for Computing Machinery, New York, NY, USA, 1470–1486. https://doi.org/10.1145/3243734.3243797