PurSec Lab
@purseclab
The PurSec Lab focuses on System Security Research. We are actively looking for interns, PhD students, and Postdocs working in #SystemSecurity at Purdue.
ID: 1287876825025314823
http://pursec.cs.purdue.edu 27-07-2020 22:26:40
89 Tweet
206 Takipçi
42 Takip Edilen
“Overall, the most important part of patching is not automation but safety,” adds Dave Jing Tian, an assistant professor at Purdue Computer Science. “It turns out that it’s non-trivial to prove that a patch does exactly what it should — nothing more or less."
I am honored to receive the Diamond Award from CERIAS at Purdue U.. I would like to thank all my mentors and collaborators, especially Dr. Berkay Celik, for his guidance and support. Special thanks to the CERIAS at Purdue U. leadership, including Dr. Dongyan Xu, Dr. Gene Spafford, and The Ghost of Cyber Past!
PurSec Lab is proud to lead the initiative to secure cyber physical systems under the DARPA firefly program. Stay tuned for exciting tools we’re baking in-house for this initiative!
I am thrilled to announce that I will join the School of Electrical Engineering and Computer Science (Penn State EECS ) at Penn State as an Assistant Professor starting this Fall. Huge thanks to my advisors and mentors: Dongyan Xu, Dave Jing Tian, Antonio Bianchi, and Berkay Celik.
PurSec Lab members are presenting 5 papers at this years USENIX Security #usesec24!
Muqi Zou presented his work on Decompiler Testing Using Symbolic Differentiation on Wednesday USENIX Security #usesec24
Final talk of PurSec lab at USENIX Security #usesec24 by Syed Ghazanfar on improving ICS attack detection!
Junpeng Wan presented his paper at USENIX Security (#usesec25) - “HubBub: Contention-Based Side-Channel Attacks on USB Hubs”. This work has several interesting attack scenarios and explores the potential side-channel risks of using USB hubs⚡️ Congrats to all authors! 🙌
Arslan Khan (with Ruoyu Wu) presented his paper at USENIX Security (#usesec25) - “NEUROSCOPE: Reverse Engineering Deep Neural Network on Edge Devices using Dynamic Analysis”, proposing a framework for reverse-engineering DNN binaries on edge devices🧠 Congrats to all authors! 🙌
Chandrika Mukherjee presented her paper at USENIX Security (#usesec25) - "Shadowed Realities: An Investigation of UI Attacks in WebXR". This study identifies UI-based vulnerabilities in WebXR and conducts a user study to measure users' perceptions 🏆 Congrats to all authors! 🙌
Doguhan Yeke presented his paper at USENIX Security (#usesec25) - "Automated Discovery of Semantic Attacks in Multi-Robot Navigation Systems". This work identifies and analyzes vulnerabilities in MRCA algorithms and proposes practical countermeasures🤖 Congrats to all authors! 🙌