Virginia Tech® home

Home

 

At BEARHW (Building Efficient and Resilient Hardware) lab, we leverage hardware features to enhance the security of computer systems as well as identify and mitigate security vulnerabilities that are rooted in hardware design. We are passionated about leveraging hardware to build secure systems.

We are looking for motivated students (postdocs, PhDs, Masters, and undergraduates) to join us! Email Dr. Xiong at wenjiex@vt.edu

News & Awards

  • 4/2024: TingHung Chiu, Purushothaman Palani, Vishnu Kumar Kalidasan, Sruthi Ayaluru Venkata Krishnan, and Akhilesh Parag Marathe defended their M.S. Thesis. Congratulations!

  • 4/2024: I received Dean's Award on Outstanding New Assistant Professor Award by Virginia Tech School of Engineering!

  • 4/2024: Mohannad Ismail Defended his PhD thesis titled "Practical Mitigations Against Memory Corruption and Transient Execution Attacks". Congratulations!

  • 2024: Dean's Award on Outstanding New Assistant Professor Award of Virginia Tech Engineering

  • 2021: Featured Paper in the April 2021 issue of IEEE Transactions on Computers (TC)

  • 2021: Honorable Mention of IEEE Micro Top Picks

  • 2021: Top Picks in Hardware and Embedded Security

  • 2020: Rising Stars in EECS Workshop

  • 2019: Top Picks in Hardware and Embedded Security

  • 2015: participant in the 3rd Heidelberg Laureate Forum 2015

  • 2015: Microsoft Research Graduate Women's Scholars

Research

Research Overview

We are living in an increasingly connected world where an unprecedented amount of data is being collected, transferred, and processed across tens of billions of connected devices and systems daily, including private user information or company intellectual properties (IPs). In addition to the pursuit of better performance and lower energy, guaranteeing security and privacy is now considered a first-class citizen in architecting and designing future computing systems.

Foundation of security: Hardware is the bottom layer of the computation stack. Hardware vulnerabilities will compromise the whole system and can hardly be mitigated by software efficiently.

Efficient security solution: Hardware-software co-design for security can yield efficient solutions.

Physical features for security: Hardware is the interface between software and the physical world. The physical and analog features of hardware can be leveraged for security.

We conduct research in the intersection of computer architecture, circuits, cryptography, formal methods, and machine learning. Our goal is to deliver efficient hardware designs with built-in security.

Research Projects

It is a trend to include several different computing modules, such as GPU, FPGA, ASIC accelerators, memory, etc., to a computing platform for high-performance computing. The heterogeneous architectures face new security challenges to protect data across different modules. New designs are needed to protect data end-to-end.

Nowadays, hardware is usually reused for different applications or users. For example, many applications are running on one device, multiple talents may share the same server on the cloud, etc. Sharing of hardware leads to the potential side and covert-channel attacks that lead to information leakage. It is a challenge to understand how these attacks happen and how to mitigate them.

Hardware has physical and analog features that can be leveraged for security purposes. In our DRAM PUFs project, we leverage the DRAM retention error for device authentication, fingerprinting, key storage, and software protection.

Sponsors

Five logos: NSF, 4-VA, Amazon, Commonwealth Cyber Initiative and the Air Force of Scientific Research

Publications


Peer-reviewed Conference Publications

Ferhat Erata, TingHung Chiu, Anthony Etim, Srilalith Nampally, Tejas Raju, Rajashree Ramu, Ruzica Piskac, Timos Antonopoulos, Wenjie Xiong, Jakub Szefer "Systematic Use of Random Self-Reducibility in Cryptographic Code against Physical Attacks" 2024 IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2024). PDF.

TingHung Chiu*, Jason LeGrow*, Wenjie Xiong* "Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques" Attacks and Solutions in Hardware Security (ASHES 24) *Author list in alphabetical order. PDF.

Trishita Tiwari, Suchin Gururangan, Chuan Guo, Weizhe Hua, Sanjay Kariyappa, Udit Gupta, Wenjie Xiong, Kiwan Maeng, Hsien-Hsin S Lee, G Edward Suh "Information flow control in machine learning through modular model architecture" the 33rd USENIX Security Symposium (USENIX Security 24). PDF.

Yilun Wu, Byounguk Min, Mohannad Ismail, Wenjie Xiong, Changhee Jung, Dongyoon Lee "IntOS: Persistent Embedded Operating System and Language Support for Multi-threaded Intermittent Computing" the 18th USENIX Symposium on Operating Systems Design and Implementation (OSDI '24). PDF.

Florian Frank, Martin Schmid, Felix Klement, Purushothaman Palani, Andreas Weber, Elif Bilge Kavun, Wenjie Xiong, Tolga Arul, and Stefan Katzenbeisser "Secure Data-Binding in FPGA-based Hardware Architectures utilizing PUFs" in Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS), 2024. PDF.

Xin Wang, Jagadish Kotra, Alex Jones, Wenjie Xiong, and Xun Jian "Counter-light Memory Encryption" in Proceedings of the International Symposium on Computer Architecture (ISCA), 2024. PDF.

Mohannad Ismail, Christopher Jelesnianski, Yeongjin Jang, Changwoo Min, and Wenjie Xiong "Enforcing C/C++ Type and Scope at Runtime for Control-Flow and Data-Flow Integrity" in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2024. PDF | CODE

Maximilian Lam, Jeff Johnson, Wenjie Xiong, Kiwan Maeng, Udit Gupta, Minsoo Rhu, Hsien-Hsin S. Lee, Vijay Janapa Reddi, Gu-Yeon Wei, David Brooks, and G. Edward Suh "GPU-based Private Information Retrieval for On-Device Machine Learning Inference" in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2024. PDF | CODE

Tinghung Chiu and Wenjie Xiong "SoK: Fault Injection Attacks on Cryptosystems." Proceedings of the 12th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP). 2023. PDF.

Wenxuan Zeng, Meng Li, Wenjie Xiong, Tong Tong, Wen-jie Lu, Jin Tan, Runsheng Wang, and Ru Huang "MPCViT: Searching for Accurate and Efficient MPC-Friendly Vision Transformer with Heterogeneous Attention" in International Conference on Computer Vision (ICCV), 2023. arXiv.

Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, and Hsien-Hsin S. Lee "Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis" in Proceedings of The International Conference on Machine Learning (ICML), 2023. arXiv.

Jiaxun Cui, Xiaomeng Yang†, Mulong Luo†, Geunbae Lee†, Peter Stone, Hsien-Hsin S. Lee, Benjamin Lee, Edward Suh, Wenjie Xiong^, and Yuandong Tian^ "MACTA: A Multi-agent Reinforcement Learning Approach for Cache Timing Attacks and Detection" in Proceedings of the 11th International Conference on Learning Representations (ICLR), 2023. PDF | CODE
Equal Second-author Contribution, ^Equal Supervising

Mulong Luo†, Wenjie Xiong†, John Lee, Yueying Li, Xiaomeng Yang, Yuandong Tian, Amy Zhang, Hsien-Hsin Sean Lee, and G. Edward Suh. "AutoCAT: Reinforcement Learning for Automated Exploration of Cache-Timing Attacks" in Proceedings of the 29th IEEE International Symposium on High Performance Computer Architecture (HPCA), 2023. PDF | arXiv | CODE
The authors contributed equally.

Hanieh Hashemi, Wenjie Xiong, Liu Ke, Kiwan Maeng, Murali Annavaram, G. Edward Suh, and Hsien-Hsin Lee, “Private Data Leakage via Exploiting Access Patterns of Sparse Features in Deep Learning-based Recommendation Systems”, Workshop on Trustworthy and Socially Responsible Machine Learning (TSRML), December 2022. PDF | arXiv

Yuan Liang, Xing Gao, Kun Sun, Wenjie Xiong, and Haining Wang, "An Investigation on Data Center Cooling Systems Using FPGA-based Temperature Side Channels" in Proceedings of the 41st International Symposium on Reliable Distributed Systems (SRDS), Sep 2022. PDF.

Yongqin Wang, G. Edward Suh, Wenjie Xiong, Benjamin Lefaudeux, Brian Knott, Murali Annavaram, Hsien-Hsin S. Lee, “Characterization of MPC-based Private Inferences for Transformer-based Models”, in Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), May 2022. PDF.

Wenjie Xiong†, Liu Ke†, Dimitrije Jankov, Michael Kounavis, Xiaochen Wang, Eric Northup, Jie Amy Yang, Bilge Acun, Carole-Jean Wu, Ping Tak Peter Tang, G. Edward Suh, Xuan Zhang, and Hsien-Hsin S. Lee, “SecNDP: Secure Near-Data Processing with Untrusted Memory”, in Proceedings of the 28th IEEE International Symposium on High Performance Computer Architecture (HPCA), April 2022. PDF SLIDES | ePrint (with full proof)

Yongqin Wang, G. Edward Suh, Wenjie Xiong, Brian Knott, Benjamin Lefaudeux, Murali Annavaram, and Hsien-Hsin Lee, “Characterizing and Improving MPC-based Private Inference for Transformer-based Models”, NeurIPS 2021 Workshop on Privacy in Machine Learning, December 2021. PDF.

Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong, and Jakub Szefer, "Cloud FPGA Cartography using PCIe Contention", in Proceedings of the International Symposium on Field-Programmable Custom Computing Machines (FCCM), May 2021. PDF.

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks", in Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2020. PDF.

Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen, and Jakub Szefer, "Fingerprinting Cloud FPGA Infrastructures", in Proceedings of the International Symposium on Field-Programmable Gate Arrays (FPGA), 2020. PDF.

Wenjie Xiong, and Jakub Szefer, "Leaking Information Through Cache LRU States", in Proceedings of the International Symposium on High-Performance Computer Architecture (HPCA), February 2020. (IEEE Micro Top Picks 2021 Honorable Mention) PDF | CODE

Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, and Jakub Szefer, "Thermal Covert Channels Leveraging Package-On-Package DRAM", in Proceedings of the International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), August 2019. PDF

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Secure TLBs", in Proceedings of the International Symposium on Computer Architecture (ISCA), June 2019. (Top Picks in Hardware and Embedded Security 2021) PDF

Wenjie Xiong, André Schaller, Stefan Katzenbeisser, and Jakub Szefer, "Dynamic Physically Unclonable Functions", in Proceedings of the Great Lakes Symposium on VLSI (GLSVLSI), May 2019. PDF

Shuwen Deng, Doğuhan Gümüşoğlu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, and Jakub Szefer, "SecChisel Framework for Security Verification of Secure Processor Architectures", in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2019. PDF

Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Stefan Katzenbeisser, and Jakub Szefer, "Spying on Temperature using DRAM", in Proceedings of the Design, Automation, and Test in Europe (DATE), March 2019. PDF | CODE

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Cache Timing Side-Channel Vulnerability Checking with Computation Tree Logic" in Proceedings of the Workshop on Hardware and Architectural Support for Security and Privacy (HASP), June 2018. PDF

André Schaller, Wenjie Xiong, Muhammad Umair Saleem, Nikolaos A. Anagnostopoulos, Stefan Katzenbeisser, and Jakub Szefer, "Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security" in Proceedings of the International Symposium on Hardware Oriented Security and Trust (HOST), May 2017. (Best Student Paper Finalist) PDF | CODE

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, and Jakub Szefer, "Run-time Accessible DRAM PUFs in Commodity Devices" in Proceedings of the Conference on Cryptographic Hardware and Embedded Systems (CHES), August 2016. (Top Picks in Hardware and Embedded Security 2019) PDF | CODE


Peer-reviewed Journal Publications

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Secure TLBs" in IEEE Design & Test, 2024. PDF

Florian Frank†, Wenjie Xiong†, Nikolaos Athanasios Anagnostopoulos, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, and Jakub Szefer, "Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature", in IEEE Transactions on Information Forensics and Security, 2023. PDF.
The authors contributed equally.

Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, and Jakub Szefer, "Survey of Approaches and Techniques for Security Verification of Computer Systems", in Journal on Emerging Technologies in Computing Systems, vol. 19, no. 1, Article 6 (January 2023). ePrint

Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, and Jakub Szefer, "Evaluation of Cache Attacks on Arm Processors and Secure Caches", in IEEE Transactions on Computers (TC), November 2021. PDF.

Wenjie Xiong, and Jakub Szefer, "Survey of Transient Execution Attacks and their Mitigations", in ACM Computing Surveys (CSUR), vol. 54, no. 3, Article 54, May 2021. PDF.

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Understanding Insecurity of Processor Caches due to Cache Timing-Based Vulnerabilities", in IEEE Security & Privacy, vol. 19, no. 3, pp. 42-49, May-June 2021. PDF.

Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, and Jakub Szefer, "DRAM PUFs in Commodity Devices", in IEEE Design & Test, 2021. PDF.

Wenjie Xiong, Stefan Katzenbeisser, and Jakub Szefer, "Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches", in IEEE Transactions on Computers (TC), vol. 70, no. 04, pp. 511-523, 2021. (Featured Paper in the April 2021 issue). PDF | CODE

Wenjie Xiong, André Schaller, Stefan Katzenbeisser, and Jakub Szefer, "Software Protection using Dynamic PUFs", in IEEE Transactions on Information Forensics and Security (TIFS), May 2019. PDF.

Shuwen Deng, Wenjie Xiong, and Jakub Szefer, "Analysis of Secure Caches using a Three-Step Model for Timing-Based Attacks" in Journal of Hardware and Systems Security (HASS), 2019.  PDF

Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, and Stefan Katzenbeisser, "Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security", in Cryptography, vol. 2, no. 3, June 2018. PDF

André Schaller†, Wenjie Xiong†, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric, Stefan Katzenbeisser and Jakub Szefer, "Decay-Based DRAM PUFs in Commodity Devices", in IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 16, issue 3, pp.462-475, May-June 1 2019. PDF.
The authors contributed equally.

News

Wenjie Xiong, and Jakub Szefer, "Memristive fingerprints prove key destruction.", Nature Electronics 1(10), p.527, 2018.

Teaching

  • ECE5504/CS5504 Computer Architecture: 2022/2023/2024 Fall
  • ECE2564 Embedded Systems: 2022/2025 Spring

Services

Conference/Workshop Organizing

  • Workshop and Program co-Chairs of International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2024)
  • Workshop and Program co-Chairs of International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2023)
  • Proceedings co-Chair for the 41th IEEE International Conference on Computer Design (ICCD 2023)
  • Organizer of Tutorial: (RL4CAS) Reinforcement Learning for Computer Architecture and Systems Research, with ISCA 2023
  • Publicity Chair for the 29th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2023)
  • Proceedings co-Chair for the 40th IEEE International Conference on Computer Design (ICCD 2022)
  • Session Chair for session 1B: “Security I” in the 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA-28)
  • Session Chair for session 1: “the eternal war of side channels” in the IEEE International Symposium on Secure and Private Execution Environment Design (SEED 2021)
  • Publications Chair for the IEEE International Symposium on Secure and Private Execution Environment Design (SEED 2021)
  • Proceedings co-Chair for the 39th IEEE International Conference on Computer Design (ICCD 2021)
  • Publicity Chair for the 28th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2022)
  • Organizing Committee of Secure and Private Systems for machine Learning (SPSL) workshop, co-located with ISCA 2021

Conferences/Workshops Program Committee Activities

  • ERC for the 50th International Symposium on Computer Architecture (ISCA'24)
  • PC for 29th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'24)
  • PC for Young Architect Workshop (YArch'23)
  • ERC for the 50th International Symposium on Computer Architecture (ISCA'23)
  • PC for 28th Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS'23)
  • PC for Cryptographic Hardware and Embedded Systems (TCHES 2023)
  • PC for International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2022)
  • PC for the IEEE International Symposium on Secure and Private Execution Environment Design (SEED 2022)
  • PC for Cryptographic Hardware and Embedded Systems (TCHES 2022)
  • ERC for Architectural Support for Programming Languages and Operating Systems (ASPLOS 2022)
  • PC for the 39th IEEE International Conference on Computer Design — Processor Architecture Track (ICCD 2021)
  • ERC for Architectural Support for Programming Languages and Operating Systems (ASPLOS 2021)
  • PC for the 9th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2020)
  • PC for the 8th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP 2019)

Journal Reviewing Activities

  • Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCAD)
  • ACM Computing Surveys (CSUR)
  • IEEE Computer Architecture Letters (CAL)
  • Design Automation for Embedded Systems (DAEM)
  • IEEE Security & Privacy
  • IEEE Transactions on Circuits and Systems I
  • IEEE Transactions on Computers (TC)
  • Advanced Electronic Materials
  • ACM Transactions on Architecture and Code Optimization (TACO)
  • IEEE Design & Test
  • Nature Electronics
  • IEEE Access
  • International Journal of Circuit Theory and Applications (CTA)
  • IEEE Consumer Electronics Magazine
  • ACM Transactions on Embedded Computing Systems (TECS)
  • IEEE Transactions on Dependable and Secure Computing (TDSC)
Instructor supervises student's work on electronic device
Wenjie Xiong (at right), assistant professor of electrical and computer engineering, works with a graduate student on high-performance hardware designs that don't skimp on security.

Openings

Getting involved! We are looking for postdocs, PhDs, Masters, and undergraduates to join us! Please email me.