Graduate Research Assistant University of Michigan Ann Arbor, MI
Group: RTCL Laboratory
— Advisor: Kang G. Shin
Description:
My research aims to develop novel cyber attacks on the memory, microarictecural, and operating systems levels, in order to better understand potential vulnerabilities and motivate the development of more secure defenses.
My research aims to ensure the integrity of integrated circuit
hardware throughout the design and deployment lifecycles to facilitate a secure
foundation for autonomous cyber-physical systems.
- Developed SpecHammer, a novel attack combining speculative execution (Spectre) and memory (Rowhammer) vulnerabilities to relax a key restriction in prior speculative execution attacks.
- Led work on the GadgetHammer attack, which demonstrated that attacks targetting memory (Rowhammer) can exploit data in general code patterns, as opposed to specific sensitive memory values, broadening the scope of memory attacks.
- Reverse engineered physical to DRAM address mapping to facilitate bit-flipping attacks on newer generation machines
- Devised novel memory massaging technique to exploit operating system's physical page allocator
- Utilized timing and memory side-channel techniques to extract information that aided in end-to-end atacks on victim memory and operating systems