
DRAM Security
Most of the modern computers include a DRAM component. We aim to understand and improve the security of data stored on DRAM.

Hardware Design Security
The designs of our hardware components are riddled with security bugs. New security analysis techniques can uncover these bugs before manufacturing.

Microarchitectural Security
The microarchitecture of a modern processor is vastly complex. This complexity has implications for security.

OS Security
Operating systems are in charge of managing hardware resources. This makes them a prime location for improving security as well as a fruitful target.