Secure networked systems
Middleboxes, encrypted traffic processing, confidential execution, and verification for outsourced network functions.
Middleboxes, encrypted traffic processing, confidential execution, and verification for outsourced network functions.
Privacy-preserving inference and training, secure federated learning, graph learning, and post-deployment safeguards.
Queryable encrypted databases, searchable encryption, leakage resilience, and practical large-scale deployments.
Modern enterprise networks heavily rely on network functions for advanced traffic processing such as deep packet inspection, traffic classification, and load balancing. Recent advances in Network Function Virtualisation (NFV) have pushed forward the paradigm of migrating in-house network functions to third-party cloud providers as software-based services for reduced cost and increased scalability. Despite its benefits, such a new service model also raises security and privacy concerns, as traffic is now redirected and processed in an untrusted environment. My research in this area focuses on two directions: 1) enabling ubiquitous network functions over encrypted network traffic via practical cryptographic protocols [IEEE INFOCOM'16], [IEEE TDSC'21] or confidential computing [ACM CCS'19], [NDSS'21], 2) providing assurance for network function execution [IEEE ICNP'16], [ACM/IEEE ToN'18].
Due to increasing popularity and rapid advancement of deep learning, public cloud service providers are promoting Machine Learning as a Service (MLaaS), e.g., AWS SageMaker. In the meantime, security and privacy issues of machine learning models, algorithms, and services are not fully understood and addressed in academia and industry. My research in this area focuses on three directions: 1) designing lightweight privacy-preserving machine learning systems [ESORICS'21], [IEEE TIFS'21], [IEEE TDSC'22-a], [IOS JCS], 2) investigating adversarial attacks and defenses on emerging ML paradigm like Graph Neural Networks (GNN) [ACM AsiaCCS'21], [IEEE ICDM'21], [ACM CIKM'21], transfer learning [IEEE TDSC'22-b], and 3) devising secure and efficient federated learning algorithms [IEEE INFOCOM'22], [IEEE TDSC'22-c].
Encrypted databases are designed to fight against massive data breaches. They preserve database query functionalities over encrypted data directly without decryption. My research in this area focuses on four aspects: 1) enabling rich queries for encrypted databases [ESORICS'15], [IEEE TMM'16], [IEEE TIFS'17], [ACM AsiaCCS'19], 2) developing encrypted NoSQL data stores [ACM AsiaCCS'16], [ACM AsiaCCS'17], 3) designing efficient encrypted search schemes with less leakage [ACM CCS'18], [ACNS'20], [ACNS'21], [NDSS'21], and 4) exploring hardening techniques for encrypted databases [IEEE INFOCOM'19], [IEEE TKDE'21], [IEEE TIFS'21].