- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Advanced Data Storage Technologies
- Cloud Data Security Solutions
- Distributed systems and fault tolerance
- Network Security and Intrusion Detection
- Parallel Computing and Optimization Techniques
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- Digital and Cyber Forensics
- User Authentication and Security Systems
- Caching and Content Delivery
- Internet Traffic Analysis and Secure E-voting
- Web Application Security Vulnerabilities
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Memory and Neural Computing
- Gaze Tracking and Assistive Technology
- Health, Environment, Cognitive Aging
- Simulation Techniques and Applications
- Collaboration in agile enterprises
- Radiation Effects in Electronics
- Network Traffic and Congestion Control
- EEG and Brain-Computer Interfaces
- Blockchain Technology Applications and Security
- Digital Rights Management and Security
UC San Diego Health System
2025
University of California, San Diego
2024-2025
Stanford University
2003-2020
Kitware (United States)
2008-2014
Laboratoire d'Informatique de Paris-Nord
2003
We present a flexible architecture for trusted computing, called Terra, that allows applications with wide range of security requirements to run simultaneously on commodity hardware. Applications Terra enjoy the semantics running separate, dedicated, tamper-resistant hardware platform, while retaining ability side-by-side normal general-purpose computing platform. achieves this synthesis by use virtual machine monitor (TVMM) partitions platform into multiple, isolated machines (VM),...
Developed more than 30 years ago to address mainframe computing problems, virtual machine monitors have resurfaced on commodity platforms, offering novel solutions challenges in security, reliability, and administration. Stanford University researchers began look at the potential of machines overcome difficulties that hardware operating system limitations imposed: This time problems stemmed from massively parallel processing (MPP) were difficult program could not run existing systems. With...
Commodity operating systems entrusted with securing sensitive data are remarkably large and complex, consequently, frequently prone to compromise. To address this limitation, we introduce a virtual-machine-based system called Overshadow that protects the privacy integrity of application data, even in event total OScompromise. presents an normal view its resources, but OS encrypted view. This allows carry out complex task managing application's without allowing it read or modify them. Thus,...
We present a flexible architecture for trusted computing, called Terra, that allows applications with wide range of security requirements to run simultaneously on commodity hardware. Applications Terra enjoy the semantics running separate, dedicated, tamper-resistant hardware platform, while retaining ability side-by-side normal general-purpose computing platform. achieves this synthesis by use virtual machine monitor (TVMM) partitions platform into multiple, isolated machines (VM),...
Shoulder-surfing -- using direct observation techniques, such as looking over someone's shoulder, to get passwords, PINs and other sensitive personal information is a problem that has been difficult overcome. When user enters keyboard, mouse, touch screen or any traditional input device, malicious observer may be able acquire the user's password credentials. We present EyePassword, system mitigates issues of shoulder surfing via novel approach input.
As sensitive data lifetime (i.e. propagation and duration in memory) increases, so does the risk of exposure. Unfortunately, this issue has been largely overlooked design most today's operating systems, libraries, languages, etc. a result, applications are likely to leave they handle (passwords, financial military information, etc.) scattered widely over memory, leaked disk, left there for an indeterminate period time. This greatly increases impact system compromise.Dealing with issues is...
Virtualization is an important enabling technology for many large private datacenters and cloud computing environments. Virtual machines often have complex expectations of their runtime environment such as access to a particular network segment or storage system. Similarly, the may virtual machine's behavior compliance with control criteria limits on type quantity traffic generated by machine. Today, these diverse requirements are too specified, communicated managed non-portable, site...
We present a flexible architecture for trusted computing, called Terra, that allows applications with wide range of security requirements to run simultaneously on commodity hardware. Applications Terra enjoy the semantics running separate, dedicated, tamper-resistant hardware platform, while retaining ability side-by-side normal general-purpose computing platform. achieves this synthesis by use virtual machine monitor (TVMM) partitions platform into multiple, isolated machines (VM),...
We present Castor, a record/replay system for multi-core applications that provides consistently low and predictable overheads. With developers can leave record replay on by default, making it practical to reproduce production bugs, or employ fault tolerance recover from hardware failures.
WebAssembly (Wasm) is a low-level platform-independent bytecode language. Today, developers can compile C/C++ to Wasm and run it everywhere, at almost native speeds. Unfortunately, this compilation from also preserves classic memory safety vulnerabilities, such as buffer overflows use-after-frees.