publications
Conference Papers
2025
- CCS’25Mole: Breaking GPU TEE with GPU-Embedded MCUIn Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2025
2024
- NDSS’24Cage: Complementing Arm CCA with GPU ExtensionsIn Network and Distributed System Security (NDSS) Symposium, 2024
- ICTAI’24Rapid Autonomy Transfer in Reinforcement Learning with a Single Pre-Trained CriticIn 2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI), 2024
- ESORICS’24BootRIST: Detecting and Isolating Mercurial Cores at the Booting StageIn European Symposium on Research in Computer Security (ESORICS), 2024
2022
- CCS’22Strongbox: A gpu tee on arm endpointsIn Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2019
- CEC’19An experimental study of large-scale capacitated vehicle routing problemsIn 2019 IEEE Congress on Evolutionary Computation (CEC), 2019
Journal Articles
2025
- TDSCBuilding Confidential Accelerator Computing Environment for Arm CCAIEEE Transactions on Dependable and Secure Computing, 2025
2023
- TDSCBuilding a Lightweight Trusted Execution Environment for Arm GPUsIEEE Transactions on Dependable and Secure Computing, 2023