Skip to main content
Homomorphic Encryption

Towards practical fully homomorphic encryption


Analyzing information leakage in the cloud

Vernam Group on GitHub

Some of our source code is published and distributed under the terms of the The MIT License (MIT).

Now Hiring!

Open Faculty, MSc/PhD positions, contact information

FastSpec: Scalable Generation and Detect...

FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings

Several techniques have been proposed to detect vulnerable Spectre gadgets in widely deployed commercial software. Unfortunately, detection techniques proposed so far rely on hand-written rules which fall short in covering subtle variations of known Spectre gadgets as well as demand a huge amount of time to analyze each conditional branch in software. Since it requires […]

JackHammer: Efficient Rowhammer on Heter...

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms

After years of development, FPGAs are finally making an appearance on multi-tenant cloud servers. Heterogeneous FPGA-CPU microarchitectures require reassessment of common assumptions about isolation and security boundaries, as they introduce new attack vectors and vulnerabilities. In this work, we analyze the memory and cache subsystem and study Rowhammer and cache attacks enabled by two proposed […]

LVI – Hijacking Transient Execution with

LVI – Hijacking Transient Execution with Load Value Injection

LVI turns previous data extraction attacks around, like Meltdown, Foreshadow, ZombieLoad, RIDL and Fallout, and defeats all existing mitigations. Instead of directly leaking data from the victim to the attacker, we proceed in the opposite direction: we smuggle — “inject” — the attacker’s data through hidden processor buffers into a victim program and hijack transient execution to acquire sensitive information, such as the […]

Upcoming seminar: Ziming Zhang

Upcoming seminar: Ziming Zhang

Thursday, October 31, 2019, 4:00 PM, AK 219 Self-Supervised Learning in Adversarial Defense and Point-Cloud SegmentationSpeaker: Ziming Zhang Abstract:Self-supervised learning is a form of unsupervised learning where the data itself provides supervision. In this talk, I will present my recent research on self-supervised learning in two computer vision applications: adversarial defense in 2D image classification […]

Upcoming Seminar: Michael Schwarz and Mo...

Upcoming Seminar: Michael Schwarz and Moritz Lipp

Monday, Oct 7 at 4:00 PM in AK 233 Transient-Execution Attacks: Exploiting the CPU’s Microarchitecture Presenter: Michael Schwarz and Moritz Lipp Abstract: 2018 was the year of CPU vulnerabilities: Spectre, Meltdown, and Foreshadow are powerful attacks exploiting the aggressive performance optimizations in modern processors. Due to predictions and lazy handling of exceptions, CPUs might inadvertently […]

Automated IoT Security and Privacy Analy...

The introduction of commodity Internet of Things (IoT) devices that integrate physical processes with digital connectivity has changed the way we live. Yet, while industry and users have embraced the systems supporting IoT, the technical community has limited capability to evaluate and ultimately enforce the correct operation of IoT implementations. As a consequence, software design […]

WPI is hiring in CyberSecurity – Faculty

WPI is hiring in CyberSecurity – Faculty Position

Worcester Polytechnic Institute Assistant/Associate/Full Professor Worcester Polytechnic Institute (WPI) is inviting applications for a tenure track faculty position in the Department of Electrical and Computer Engineering at the Assistant, Associate, or Full Professor level. The successful candidate will have a strong background in the broad area of Cybersecurity and privacy, with expertise subdomains including Blockchains […]