← Back to Overview

Systems Security.

Investigating the foundational layers of computing to build resilient, identity-aware systems that withstand modern adversarial threats.

Focus Areas

  • Hardware-Anchored Identity

    Leveraging Physical Unclonable Functions (PUFs) and Root-of-Trust (RoT) to establish immutable system identities.

  • Architectural Vulnerability Analysis

    Identifying and mitigating side-channel attacks and speculative execution leaks in modern processors.

  • Resilient OS Kernels

    Researching formal verification and memory-safe implementations for critical system components.

Selected Publications

IEEE SVCC 2025

Inter-Device User Keystroke Analysis

ACM TOPS 2020

Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification

IEEE Dataport 2019

SU-AIS BB-MAS Dataset: Behavioral Biometrics Multi-device and Multi-Activity Data from Same Users

IEEE AISP 2020

DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices

IEEE AISP 2020

Classification of Threat Level in Typing Activity Through Keystroke Dynamics

Vulnerabilities & CVEs

CVE-2025-32105

Sangoma IMG2020 HTTP Server Buffer Overflow

CVE-2025-32106

Audiocodes Mediapack MP-11x Remote Code Execution

IEEE ICCCNT 2025

Overflow Attacks on Telecommunications Hardware