Publications

DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks

USENIX Security' Xingkai Wang, Wenbo Shen, Yujie Bu, Jinmeng Zhou, Yajin Zhou
24
  • Designed hardware-software co-design to perform access authentication for all the DMA transactions, providing fine-grained spatial and strong temporal legitimacy guarantees.
  • Used hardware description languages to integrate the solution between the PCIe bus and memory controller. Evaluated the implemetation with real-world hardware connected to RISC-V SoC on FPGA.
  • Conducted detailed characterization about DMA transactions revealing access pecularity.
  • Implemented both RISC-V and ARM QEMU emulators to show cross-architecture capability.
  • Provided a fully customizable research platform for the community to study DMA and host-peripheral interactions, contributing to enhanced security in modern computing systems.

Ambush from All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines

TDSC' Ziyue Pan, Wenbo Shen, Xingkai Wang, Yutian Yang, Rui Chang, Yao Liu, Chengwei Liu, Yang Liu, Kui Ren
23
  • Analyzed potential vulnerabilities, such as information leakage, remote code execution, and pipeline output modification. Developed proof-of-concept attacks and proposed mitigations.
  • Conducted a large-scale analysis of over 300,000 GitHub repositories and 8,000 unique scripts created by more than 5000 developers, providing dataset for future CI/CD related researchs.
0%