Publications
DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks
USENIX Security'
Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou
24
- Designed hardware-software co-design to perform access authentication for all the DMA transactions, providing fine-grained spatial and strong temporal legitimacy guarantees.
- Used hardware description languages to integrate the solution between the PCIe bus and memory controller. Evaluated the implemetation with real-world hardware connected to RISC-V SoC on FPGA.
- Conducted detailed characterization about DMA transactions revealing access pecularity.
- Implemented both RISC-V and ARM QEMU emulators to show cross-architecture capability.
- Provided a fully customizable research platform for the community to study DMA and host-peripheral interactions, contributing to enhanced security in modern computing systems.
Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines
TDSC'
Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren
23
- Analyzed potential vulnerabilities, such as information leakage, remote code execution, and pipeline output modification. Developed proof-of-concept attacks and proposed mitigations.
- Conducted a large-scale analysis of over 300,000 GitHub repositories and 8,000 unique scripts created by more than 5000 developers, providing dataset for future CI/CD related researchs.