Web Analytics
S3 Lab - Software & Systems Security Laboratory The University of Texas at Dallas

program analysis people

Minkyung Park
Minkyung Park
Post-doctoral associate
Zelun Kong
Zelun Kong
PhD student

program analysis courses and seminar

Software & Systems Security Seminar

A group seminar to read and discuss papers from recent and imminent top-tier security conferences.

program analysis projects

Trusted Things Trusted Things

The Trusted Things project develops new software systems to enable secure IoT leveraging trusted execution environment techniques.

Shear Shear

The Shear project creates a secure environment for the least-authority execution of over-privileged applications that may be exploited by adversaries to launch privileged attacks.

RetroFirm RetroFirm

The RetroFirm project focuses on analyzing and modifying the off-the-shelf firmware binary images of various cyber-physical and IoT systems to enhance their security.

PeriShield PeriShield

The PeriShield project analyzes the security of various types of peripheral devices and it develops cutting-edge tools to detect/prevent malicious peripherals.

AI Vault AI Vault

The AI Vault project designs and develops a new trusted execution environment tailored to run artificial intelligence and machine learning programs on modern AI platforms (e.g., cloud and embedded devices) while providing strong data confidentiality and high efficiency.

AutoInsight AutoInsight

The AutoInsight project applies advanced techniques in software security and control systems to build a new security analysis platform for modern autonomous driving systems.

RetroV RetroV

Robotic vehicles (also known as drones) are facing various threats of cyber-physical attacks that exploit their security vulnerabilities. RetroV develops automated analysis tools to find such vulnerabilities in existing robotic vehicle systems and retrofit their design against advanced cyber-physical attacks.

CLUE CLUE

The CLUE project develops an infrastructure to detect and diagnose system anomalies in enterprise and cloud systems. These anomalies include stealthy malware and other types of hidden system anomalies. CLUE provides a diverse set of tools to find and understand such anomalies with minimal disruption to the target system.

recent program analysis publications (see all)

FreePart: Hardening Data Processing Software via Framework-based Partitioning and Isolation
Ali Ahad, Gang Wang, Chung Hwan Kim, Suman Jana, Zhiqiang Lin, and Yonghwi Kwon
In ASPLOS 2024 [ pdf :: bibtex ]
PASAN: Detecting Peripheral Access Concurrency Bugs within Bare-metal Embedded Applications
Taegyu Kim, Vireshwar Kumar, Junghwan Rhee, Jizhou Chen, Kyungtae Kim, Chung Hwan Kim, Dongyan Xu, and Dave (Jing) Tian
In USENIX Security 2021 [ pdf :: slides :: bibtex ]