Resources.

  EPI: Efficient Pointer Integrity For Securing Embedded Systems

IEEE International Symposium on Secure and Private Execution Environment Design (SEED) 2021
(DOI: 10.1109/SEED51797.2021.00028)

  Securing Resource-Constrained Processors with Name Confusion

IEEE International Symposium on Secure and Private Execution Environment Design (SEED) 2021

  ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks

ACM/IEEE Annual International Symposium on Computer Architecture (ISCA) 2021
(DOI: 10.1109/ISCA52012.2021.00082)

  No-FAT: Architectural Support for Low Overhead Memory Safety Checks

ACM/IEEE Annual International Symposium on Computer Architecture (ISCA) 2021
(DOI: 10.1109/ISCA52012.2021.00076)

  Bespoke Security for Cyber-Physical Systems

Ph.D. Dissertation
(DOI: 10.7916/d8-cgaj-mz52)

  SPAM: Stateless Permutation of Application Memory

arXiv

  Practical Byte-Granular Memory Blacklisting using Califorms

IEEE/ACM International Symposium on Microarchitecture (MICRO) 2019
(DOI: 10.1145/3352460.3358299)
IEEE Micro Top Picks Honorable Mention

  YOLO: Frequently Resetting Cyber-Physical Systems for Security

SPIE Defense & Commercial Sensing 2019
(DOI: 10.1117/12.2518909)

  Charting the Cyber-Physical System Security Landscape

Ph.D. Candidacy Exam

  A Story of Under-C Discovery and Adventure: A Look at Memory Safety

Silicon Valley Cyber Security Meetup

  Go Go Gadget! An Intro to Return Oriented Programming (ROP)

Silicon Valley Cyber Security Meetup

  WACI: How To Make Driving Awesome

ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2018