Research

Trustworthy Computing

Create isolated execution environments to protect secure code/data and check system integrity against compromised OS or hypervisors on both X86 and ARM processors using hardware security extension such as ARM TrustZone, Intel SGX/TXT/SMM.

[Related Publications]

Moving Target Defense and Deception

Create adaptive virtualized network Framework that (1) protects a production system through hiding it in a continuously morphing virtual network and (2) serves disinformation with attractive but believable decoys.

[Related Publications]

Password Management

Enhance the traditional password mechanism (that should have presumedly “died” long time ago) on password selection and password vault protection.

[Related Publications]

Smartphone Security

Enhance the security of mobile phones in various layers including firmware, mobile OS, and mobile apps.

[Related Publications]

Comments are closed.