PurSec Lab (@purseclab) 's Twitter Profile
PurSec Lab

@purseclab

The PurSec Lab focuses on System Security Research. We are actively looking for interns, PhD students, and Postdocs working in #SystemSecurity at Purdue.

ID: 1287876825025314823

linkhttp://pursec.cs.purdue.edu calendar_today27-07-2020 22:26:40

89 Tweet

206 Followers

42 Following

Hyungsub Kim (@benjaminkim0920) 's Twitter Profile Photo

It is my honor to be mentioned as one of the noteworthy reviewers at RAID’23. Thanks for providing valuable junior PC opportunities!

Hyungsub Kim (@benjaminkim0920) 's Twitter Profile Photo

I'm excited to announce that my paper on robotic vehicles has been accepted to S&P'24!🎉The topic is quite different from what I did before. I'm eager to share more details after the meta-review step. Please stay tuned!

Purdue Computer Science (@purduecs) 's Twitter Profile Photo

“Overall, the most important part of patching is not automation but safety,” adds Dave Jing Tian, an assistant professor at Purdue Computer Science. “It turns out that it’s non-trivial to prove that a patch does exactly what it should — nothing more or less."

Muslum Ozgur Ozmen (@mozgurozmen) 's Twitter Profile Photo

I am honored to receive the Diamond Award from CERIAS at Purdue U.. I would like to thank all my mentors and collaborators, especially Dr. Berkay Celik, for his guidance and support. Special thanks to the CERIAS at Purdue U. leadership, including Dr. Dongyan Xu, Dr. Gene Spafford, and The Ghost of Cyber Past!

I am honored to receive the Diamond Award from <a href="/cerias/">CERIAS at Purdue U.</a>. I would like to thank all my mentors and collaborators, especially Dr. <a href="/ZBerkayCelik/">Berkay Celik</a>, for his guidance and support. Special thanks to the <a href="/cerias/">CERIAS at Purdue U.</a> leadership, including Dr. Dongyan Xu, Dr. <a href="/TheRealSpaf/">Gene Spafford</a>, and <a href="/joel_rasmus/">The Ghost of Cyber Past</a>!
Hyungsub Kim (@benjaminkim0920) 's Twitter Profile Photo

Thrilled to announce I'll be joining the CS Department at Indiana University, Bloomington (IU Bloomington, IU Luddy) as an Assistant Professor in Fall 2024. Huge thanks to my mentors and beloved family members for their unwavering support. Super excited about this new chapter!

Thrilled to announce I'll be joining the CS Department at Indiana University, Bloomington (<a href="/IUBloomington/">IU Bloomington</a>, <a href="/IULuddy/">IU Luddy</a>) as an Assistant Professor in Fall 2024. Huge thanks to my mentors and beloved family members for their unwavering support. Super excited about this new chapter!
PurSec Lab (@purseclab) 's Twitter Profile Photo

PurSec Lab is proud to lead the initiative to secure cyber physical systems under the DARPA firefly program. Stay tuned for exciting tools we’re baking in-house for this initiative!

PurSec Lab (@purseclab) 's Twitter Profile Photo

We are excited to present our new tool Patcherex2. We designed it from the ground up to be a highly modular binary patching framework making it easier to add support for new architectures and maintain compared to the original Patcherex. Try it out for your future patching needs.

Arslan Khan (@arslan0o0) 's Twitter Profile Photo

I am thrilled to announce that I will join the School of Electrical Engineering and Computer Science (Penn State EECS ) at Penn State as an Assistant Professor starting this Fall. Huge thanks to my advisors and mentors: Dongyan Xu, Dave Jing Tian, Antonio Bianchi, and Berkay Celik.

Arslan Khan (@arslan0o0) 's Twitter Profile Photo

I am currently looking for highly motivated students to join my research group. Reach out if you're interested in systems/software security technologies, such as software compartmentalization, fuzzing, or any domain of embedded systems, such as automotive, ICS, robotics, CPS...

PurSec Lab (@purseclab) 's Twitter Profile Photo

Raymond Muller presented his paper at IEEE S&P (#ieeesp2025) “Investigating Physical Latency Attacks against Camera-based Perception”

Raymond Muller presented his paper at <a href="/IEEESSP/">IEEE S&P</a> (#ieeesp2025) “Investigating Physical Latency Attacks against Camera-based Perception”
PurSec Lab (@purseclab) 's Twitter Profile Photo

Junpeng Wan presented his paper at USENIX Security (#usesec25) - “HubBub: Contention-Based Side-Channel Attacks on USB Hubs”. This work has several interesting attack scenarios and explores the potential side-channel risks of using USB hubs⚡️ Congrats to all authors! 🙌

Junpeng Wan presented his paper at <a href="/USENIXSecurity/">USENIX Security</a>  (#usesec25) - “HubBub: Contention-Based Side-Channel Attacks on USB Hubs”. This work has several interesting attack scenarios and explores the potential side-channel risks of using USB hubs⚡️
Congrats to all authors! 🙌
PurSec Lab (@purseclab) 's Twitter Profile Photo

Arslan Khan (with Ruoyu Wu) presented his paper at USENIX Security (#usesec25) - “NEUROSCOPE: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic Analysis”, proposing a framework for reverse-engineering DNN binaries on edge devices🧠 Congrats to all authors! 🙌

Arslan Khan (with Ruoyu Wu) presented his paper at <a href="/USENIXSecurity/">USENIX Security</a> (#usesec25) - “NEUROSCOPE: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic Analysis”, proposing a framework for reverse-engineering DNN binaries on edge devices🧠
Congrats to all authors! 🙌
PurSec Lab (@purseclab) 's Twitter Profile Photo

Chandrika Mukherjee presented her paper at USENIX Security (#usesec25) - "Shadowed Realities: An Investigation of UI Attacks in WebXR". This study identifies UI-based vulnerabilities in WebXR and conducts a user study to measure users' perceptions 🏆 Congrats to all authors! 🙌

Chandrika Mukherjee presented her paper at <a href="/USENIXSecurity/">USENIX Security</a> (#usesec25) - "Shadowed Realities: An Investigation of UI Attacks in WebXR". This study identifies UI-based vulnerabilities in WebXR and conducts a user study to measure users' perceptions 🏆
Congrats to all authors! 🙌
PurSec Lab (@purseclab) 's Twitter Profile Photo

Doguhan Yeke presented his paper at USENIX Security (#usesec25) - "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems". This work identifies and analyzes vulnerabilities in MRCA algorithms and proposes practical countermeasures🤖 Congrats to all authors! 🙌

Doguhan Yeke presented his paper at <a href="/USENIXSecurity/">USENIX Security</a> (#usesec25) - "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems". This work identifies and analyzes vulnerabilities in MRCA algorithms and proposes practical countermeasures🤖
Congrats to all authors! 🙌