Systems Security.
Investigating the foundational layers of computing to build resilient, identity-aware systems that withstand modern adversarial threats.
Focus Areas
-
Hardware-Anchored Identity
Leveraging Physical Unclonable Functions (PUFs) and Root-of-Trust (RoT) to establish immutable system identities.
-
Architectural Vulnerability Analysis
Identifying and mitigating side-channel attacks and speculative execution leaks in modern processors.
-
Resilient OS Kernels
Researching formal verification and memory-safe implementations for critical system components.
Selected Publications
IEEE SVCC 2025
Inter-Device User Keystroke Analysis
ACM TOPS 2020
Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification
IEEE Dataport 2019
SU-AIS BB-MAS Dataset: Behavioral Biometrics Multi-device and Multi-Activity Data from Same Users
IEEE AISP 2020
DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices
IEEE AISP 2020
Classification of Threat Level in Typing Activity Through Keystroke Dynamics
Vulnerabilities & CVEs
CVE-2025-32105
Sangoma IMG2020 HTTP Server Buffer Overflow
CVE-2025-32106
Audiocodes Mediapack MP-11x Remote Code Execution
IEEE ICCCNT 2025
Overflow Attacks on Telecommunications Hardware