Research

Filters
Tags:
Cryptography
Operating System
Security & Privacy
Smart Building
Security and Privacy
Sensing
Physics-informed
LLM
Security
Human-Computer Interaction
Virtualization
Open Source Contribution
Programming Language
Misusing Tools in Large Language Models With Adversarial Examples
advised by Earlence Fernandes and Taylor Bert.
Jun 2023 - Present
#LLM
#Security

LLMs are being enhanced with the ability to use tools and to process multiple modalities (and formulate agents). These new capabilities bring new benefits and also new security risks. In this thrust of work, we show a novel threat model where an attacker can use automatically generated adversarial examples to cause attacker-desired tool usage. For example, the attacker could cause a victim LLM to delete calendar events, leak private conversations and book hotels.

Press(WIRED)
Website (Imprompter)
Physics-Informed Data Denoising for Real-Life Sensing Systems
Collaborated with Xiyuan Zhang, and others
Jun 2023 - Present
#Sensing
#Physics-informed

Sensors measuring real-life physical processes are ubiquitous in today’s interconnected world. These sensors inherently bear noise that often adversely affects performance and reliability of the systems they support. Classic filtering-based approaches introduce strong assumptions on the time or frequency characteristics of sensory measurements, while learning-based denoising approaches typically rely on using ground truth clean data to train a denoising model, which is often challenging or prohi ...

Sensys23 Paper
Smart Building and Sensing
With Jason Koh, Dezhi Hong, Rajesh K. Gupta, and Gabe Fierro.
Oct 2019 - Present
#Smart Building
#Operating System

The recent advancement in Cyber Physical Systems (CPS) and the Artificial Intelligence of Things (AIOT) has brought significant productivity and utility enhancement across all walks of life. However, safety and security concerns and usability challenges have prohibited the wide adoption of AI-powered smart "things" in large-scale real-world systems. My research aims to close this gap by enabling secure and safe interaction with Cyber-Physical Systems in a user-friendly manner. Smart commercial b ...

ICCPS24 Paper (Best Paper Nomination)
BuildSys20 Poster
Code
BuildSys23 Paper (BEAR)
RLEM22 Paper (B2RL)
Sensys23 Paper (PILOT)
Context-Aware, Continuous Authentication Using Biometrics & Fuzzy Extractors
With Rahul Chatterjee, Varun Chandrasekaran
Jun 2020 - Present
#Security & Privacy
#Cryptography

In our work, we deviate from the status quo and show how users can authenticate themselves using biometrics whilst. We utilize primitives from cryptography -- namely fuzzy extractors -- to ensure that there is no requirement to perform template matching (of a template stored in the clear) on trusted hardware.

Improving gVisor Memory Subsystem Performance
Jan 2020 - June 2020
#Operating System
#Virtualization
#Open Source Contribution

In this project, we analyzed the performance of the gVisor memory management subsystem, starting from benchmarking malloc and ending up focusing on MMAP. We further profiled MMAP performance within gVisor and identified its bottlenecks. We proposed an optimization in the free page searching algorithm of virtual memory space within gVisor (from O(N) to O(logN)). This optimization patch has been merged into production.

code
slide
report
Constant-Time Analysis for Well-Known Cryptography Libraries
Apr 2020 - Present
#Security & Privacy
#Programming Language
#Cryptography

This project presents a toolset for assessing whether a cryptographic function is constant-time on two given (distinct)input sets. The toolset extends new support to languages other than C or C++, including Python3, Golang, and JavaScript. We present a comprehensive test suite covering common cryptographic primitives and providing finely-chosen inputs that can cause non-constant-time behavior of certain implementations. We then evaluate our approach by applying this test suite to a set of librar ...

draft(pdf)
Display object alignment may influence location recall in unexpected ways
With Peter Zelchenko, Xiangqian Li, Alex Ivanov, Zhenyu Gu
Jun 2018 - Sep 2018
#Human-Computer Interaction

There is a presumption in human-computer interaction that laying out menus and most other material in neat rows and columns helps users get work done. The rule has been so implicit in the field of design to allow for no debate. However, the idea that perfect collinearity creates an advantage for both either search and or recall has rarely been tested. We conducted several experiments to test this. Note, I'm no longer on this project after Sep. 2018. The submitted paper is the latest version cont ...

pdf
Secure and Private 'Dating' System
May 2019 - June 2020 (Suspended)
#Cryptography
#Security and Privacy

Dating applications are widely adopted all over the world. However, most of them do not have a very good security and privacy guarantee. On one hand, who's confessing love to whom is not something secret to the service provider. On the other hand, if the target user B of user A refuses the request, severe embarrassment will be caused in between them. In this project, we aimed to tackle these two issues. We proposed a preliminary cryptography protocol for this and developed a WeChat MiniApp on to ...

code
poster
Last Updated on Jun 1st 2025