My research efforts have been focused around several different areas of computer security. I have grouped a selection of my publications by area below, sorted by date. Papers marked with * were written during graduate school. My CV is available here and all of my papers are available here.
One major theme of my research is embedded systems security, with an emphasis on the security of computer systems used in automobiles and airplanes.
- Jetset: Targeted Firmware Rehosting for Embedded Systems. 2021 USENIX Security Symposium. To appear.
- Triton: A Software-Reconfigurable Federated Avionics Testbed. 2019 Workshop on Cyber Security Evaluation and Test.
- Sentinel: Secure Mode Profiling and Enforcement for Embedded Systems. 2018 ACM/IEEE International Conference on Internet of Things Design and Implementation.
- On the Security of Mobile Cockpit Information Systems. 2014 ACM Conference on Computer and Communication Security.
- iSeeYou: Disabling the MacBook Webcam Indicator LED. 2014 USENIX Security Symposium.
- Security Analysis of a Full-Body Scanner. 2014 USENIX Security Symposium.
- Comprehensive Experimental Analyses of Automotive Attack Surfaces.* 2011 USENIX Security Symposium. Finalist for the 2011 NYU-Poly AT&T Best Applied Security Paper Award.
- Experimental Security Analysis of a Modern Automobile.* IEEE Symposium on Security and Privacy. IEEE Test of Time Award.
- Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.* 2009 Electronic Voting Technologies Workshop/Workshop on Trustworthy Elections.
A second theme of my research focuses on low-level software attacks like return-oriented programming and defenses like control-flow integrity.
- Run-DMA. 2015 USENIX Workshop on Offensive Technology.
- Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM. 2014 USENIX Security Symposium.
- Iago Attacks: Why the System Call API is a Bad Untrusted RPC Interface. 2013 ACM International Conference on Architectural Support for Programming Languages and Operating Systems.
- Return-Oriented Programming without Returns.* 2010 ACM Conference on Computer and Communication Security.
- Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.* 2009 Electronic Voting Technologies Workshop/Workshop on Trustworthy Elections.
A third theme of my research has examined aspects of the security of network protocols including Transportation Layer Security (TLS), Internet Key Exchange (IKE), and OpenID Connect.
- O Single Sign-Off, Where Art Thou? An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web. 2018 USENIX Security Symposium.
- Where Did I Leave My Keys? Lessons from the Juniper Dual EC Incident. Communications of the ACM.
- A Systematic Analysis of the Juniper Dual EC Incident. 2016 ACM Conference on Computer and Communication Security. Best paper award. IRTF Applied Networking Research Prize.
- On the Practical Exploitability of Dual EC in TLS Implementations. 2014 USENIX Security Symposium.