About
I am a Ph.D. student at Indiana University Bloomington. My long-term goal is to strengthen runtime defenses for Confidential Computing (e.g., against control-flow hijacking) without degrading confidentiality or performance. To that end, I study Programming Languages and Formal Verification and tie them to Operating Systems architecture for end-to-end designs.
Previously, I completed my master's at Carnegie Mellon University (INI) and collaborated with the Amazon AWS Kani team on model checking for Rust's standard library. As an undergraduate at Purdue XINU Lab, I integrated mouse/keyboard drivers into Xinu-x86-GUI, wiring the init path, IRQ handling, and scheduling/memory interactions to deliver stable GUI I/O for teaching.
Education
- Ph.D. in Computer Science, Indiana University Bloomington, 2025–present
- M.S. in Information Security, Carnegie Mellon University
- B.S., Purdue University
Ongoing Projects
Protocol Analysis Pipeline
Extract Optional Security Features (OSF), build an Optional Path Tree (OPT), map spec divergences to implementations; verified cases in TLS 1.3 HRR and Matter with PoC. Built a JSONL→prompt generator to drive Claude Code for precise code-path auditing, forming a text-evidence → attack-path → implementation-check → report loop.
Detecting AI-Driven Scientific Fraud
A Structured Data Misconduct Database for reproducibility/taint analysis; risk assessment and workflows for AI for Science.
Confidential Computing Runtime Defense
PL/Verification-aware runtime monitoring for enclaves/VMs to detect and block control-flow and memory exploits with low overhead and provable properties.
News
- 2025 — Extended Protocol Analysis Pipeline with TLS 1.3 HRR & Matter cases (PoC and implementation diffs).
- 2025 — Joined IU Bloomington CS Ph.D.; confirmed research focus on Confidential Computing.
- 2024 — Completed CMU × AWS Kani practicum; key NonZero proofs landed in CI.
- 2023 — Delivered Xinu-x86-GUI input drivers and regression tests at Purdue XINU Lab.