Researcher in Cybersecurity, Firmware Security, AI, and Machine Learning. [Google Scholar]
Investigating secure boot mechanisms, trusted hardware, and more...
Read MoreWe present a novel framework (S-RFUP) that integrates industry standard protocols (PLDM, MCTP)...
Read MoreWe introduce the notion of Attack-Connectivity Graph (ACG) that allows us to perform simultaneous modeling of attack...
Read MoreWe conduct a systematic evaluation of various white-box adversarial attacks, where...
Read MoreEnhancing the Protection in Transit (PIT) protocol—which locks devices during transit to prevent unauthorized firmware tampering—we formally verify...
Read MoreWe present a novel modeling paradigm, Resiliency Graph (RG) that combines the power of Natural Language Processing (NLP) and AI Planning (PDDL)...
Read More