| SW Security                                                Instruction-Level Data Isolation for the Kernel on ARM, Annual Design Automation Conference (DAC), Jun 2017 | 
                            
                    | HW Security                                                Hardware-assisted Efficient Long Branch Tracing for Control Flow Integrity on x86 Processors, Design Automation Conference WIP, Jun 2017 | 
                            
                    | HW Security                                                Using CoreSight PTM to Integrate CRA Monitoring IPs in an ARM-Based SoC, ACM TRANSACTIONS ON DESIGN AUTOMATION OF ELECTRONIC SYSTEMS, May 2017 | 
                            
                    | HW Security                                                Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping, IEEE Transactions on Dependable and Secure Computing, Apr 2017 | 
                            
                    | SW Security                                                SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs, Network and Distributed System Security Symposium (NDSS), Feb 2017 | 
                            
                    | SW Security                                                Dynamic Virtual Address Range Adjustment for Intra-Level Privilege Separation on ARM, Network and Distributed System Security Symposium (NDSS), Feb 2017 (Acceptance rate: 16%) | 
                            
                    | Mobile Cloud Computing                                                An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, The 4th International Conference on Network, Communication and Computing (ICNCC), published in International Journal of Engineering and Technology (IJET), Feb 2017 | 
                            
                    | Mobile Cloud Computing                                                An Effective Cloud Solution to Ensure the Integrity of Mobile Application via Execution Offloading, International Journal of Engineering and Technology 9 (1), Feb 2017 | 
                            
                    | HW Security                                                Efficient Security Monitoring with Core Debug Interface in an Embedded Processor, ACM Transactions on Design Automation of Electronic Systems (TODAES), Dec 2016 | 
                            
                    | SW Security                                                Toward Engineering a Secure Android Ecosystem: A Survey of Existing Techniques, ACM Computing Surveys (CSUR), Nov 2016 | 
                            
                    | AI Security                                                LSTM-Based System-Call Language Modeling and Robust Ensemble Method for Designing Host-Based Intrusion Detection Systems, arXiv preprint arXiv:1611.01726, Nov 2016 | 
                            
                    | SW Security                                                A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It’s Applications, International Conference on Computer Science and its Applications, 694-698, Nov 2016 | 
                            
                    | HW Security                                                A Hardware-based Technique for Efficient Implicit Information Flow Tracking, International Conference on Computer Aided Design (ICCAD), Nov. 2016 (Acceptance rate: 23%) | 
                            
                    | Mobile Cloud Computing                                                Optimization Techniques to Enable Execution Offloading for 3D Video Games, Multimedia Tools and Applications(MTAP), Jul 2016 | 
                            
                    | Application Specific Architectures                                                Development of Custom Digital Signal Processor for Finger Recognition Vision Application, International Conference on Ubiquitous Computing Application and Wireless Sensor Network, Jul 2016 | 
                            
                    | SW Security                                                Instant OS Updates via Userspace Checkpoint-and-Restart, USENIX Annual Technical Conference (ATC),  June 2016 | 
                            
                    | SW Security                                                Hardware-Assisted On-Demand Hypervisor Activation for Efficient Security Critical Code Execution on Mobile Devices, USENIX Annual Technical Conference(ATC), Jun 2016 (Acceptance rate: 19%) | 
                            
                    | HW Security                                                Architectural Supports to Protect OS Kernels from Code-Injection Attacks Hardware and Architectural Support for Security and Privacy (HASP), Jun 2016 | 
                            
                    | HW Security                                                A Hardware-based Technique for Efficient Implicit Information Flow Tracking, Design Automation Conference (DAC) WIP, Jun 2016 | 
                            
                    | HW Security                                                HDFI: Hardware-Assisted Data-flow Isolation, IEEE S&P , May 2016 (Acceptance rate: 13.3%) |