Welcome to the website of Architecture for Security Lab. Our research focus is on computer architecture and hardware design for improving system security. Specific projects include protection of application secrets from compromised system software layers, support for isolated execution, defenses against side channel attacks, transient execution attacks and code reuse attacks. We also investigate efficient information flow tracking and hardware supported malware detection. Please check our publication page for more details. Our work has been supported by multiple grants from the National Science Foundation, the Air Force Research Laboratory and Qatar National Research Fund.
LATCH paper accepted to MICRO. Congratulations Daniel and Khaled!
SMT-COP paper accepted to PACT and was nominated for best paper award. Congratulations, Daniel!
SafeSpec paper presented at DAC'2019. This is a principled defense against transient execution attacks. In the news
Jump-over-ASLR paper was selected for presentation at the Top Picks in Hardware and Embedded Security workshop, held at ICCAD 2018.
Atsuko Shimizu joins our research group.
BranchScope attack has been presented at ASPLOS'2018. CVE-2018-9056 In the news
Jump-over-ASLR paper contributes to the development of Spectre/Meltdown attacks. It is one of a few papers cited by the Google Project Zero report detailing these vulnerabilities. Story
Dmitry Evtyushkin defended his PhD dissertation. He is going to join the College of William and Mary as an Assistant Professor. Congratulatons, Dmitry!
Jump-over-ASLR attack on the branch predictor has been presented at MICRO'2016.In the news
We received a new NSF grant to investigate hardware-supported malware detection.
Our paper on covert channels through RNG hardware was accepted to CCS'16! Congratulations, Dmitry!
Jesse Elwell defended his PhD dissertation. He will be joining Vencore Labs. Congratulations, Jesse!
Our paper on bypassing ASLR was accepted to MICRO-49! Congratulations, Dmitry!
Daniel Townley joined our research group. Welcome, Daniel!
Caleb Donovick won Provost's Award for Undergraduate Research Excellence. He will be joining the PhD program at Stanford starting Fall 2016. Congratulations, Caleb!
Our paper on LLC side-channel attack was accepted to DAC 2016 and was nominated for the best paper award. Congratulations, Mehmet!
Jesse Elwell won the Graduate Student Award for Excellence in Research. Congratulations, Jesse!
An extended version of our paper on covert channels through branch predictors has been accepted to ACM TACO. Congratulations, Dmitry!
Our paper on non-inclusive memory permissions has been accepted to ACM TACO. Congratulations, Jesse!
Our paper on ensemble learning for MAP was accepted to RAID 2015. Congratulations, Khaled!
Mehmet Kayaalp defended his PhD dissertation. He will be joining IBM Research to work on secure embedded systems. Congratulations, Mehmet!
Our paper on covert channels through branch predictors appeared in HASP Worskshop held at ISCA-2015.
Meltem Ozsoy defended her PhD dissertation. She joined Intel Security and Privacy Lab. Congratulations, Meltem!
MAP paper has been accepted to HPCA 2015.