My colleague Jakob is in Ha Noi 🇻🇳 at @ACM #AsiaCCS this week to present our paper "BISON: Blind Identification with Stateless scOped pseudoNyms".

In this paper,
- we use OPRFs to build a delegated authentication scheme (following OIDC flows) that
- prevents leaking user behaviour to the central system, and
- prevents linking of users between different services.

Think "Sign in with Google" without Google learning where you sign in.

📄: https://dl.acm.org/doi/10.1145/3708821.3733890 (open access)
</>: https://github.com/iaik-jheher/BISON

@isec_tugraz @mirren

As we welcome 2025, I'd like to take a moment to reflect on what an extraordinary year 2024 has been for Brown CS Secure Systems Lab (https://gitlab.com/brown-ssl/). It has been a year of innovation, creativity, and growth—both for the lab and for me personally as its director. Witnessing the passion, dedication, and brilliance of our team—Neophytos Christou, Alexander Gaidis, Marius Momeu, @dijin, and Vaggelis Atlidakis—has been truly fulfilling and inspiring!

In 2024, we tackled complex challenges and made significant strides in advancing our research on software hardening and OS kernel protection. Here are some highlights from this remarkable year:

✳️ Marius Momeu presented #SafeSlab at @acm_ccs #CCS2024. Safeslab hardens the Linux SLUB allocator against exploits that abuse use-after-free (#UaF) vulnerabilities, using #Intel #MPK. (Joint work with Technical University of Munich and @mikepo.)
📄 https://cs.brown.edu/~vpk/papers/safeslab.ccs24.pdf
💾 https://github.com/tum-itsec/safeslab

✳️ Neophytos Christou presented #Eclipse at @acm_ccs #CCS2024. Eclipse is a compiler-assisted framework that propagates artificial data dependencies onto sensitive data, preventing the CPU from using attacker-controlled input during speculative execution.
📄 https://cs.brown.edu/~vpk/papers/eclipse.ccs24.pdf
💾 https://gitlab.com/brown-ssl/eclipse

✳️ Di Jin presented #BeeBox at the @usenixassociation Security Symposium 2024. BeeBox hardens #Linux BPF/eBPF against transient execution attacks. #usesec24
📄 https://cs.brown.edu/~vpk/papers/beebox.sec24.pdf
💾 https://gitlab.com/brown-ssl/beebox

✳️ Yaniv David presented #Quack at the NDSS Symposium 2024. Quack hardens PHP code against deserialization attacks using a novel (static) duck typing-based approach. (Joint work with Andreas D Kellas and Junfeng Yang.) #NDSSsymposium2024
📄 https://cs.brown.edu/~vpk/papers/quack.ndss24.pdf
💾 https://github.com/columbia/quack

✳️ Marius Momeu presented #ISLAB at @ACM #ASIACCS24. ISLAB hardens SLAB-based (kernel) allocators, against memory errors, via SMAP-assisted isolation. (Joint work with Technical University of Munich and @mikepo.) #asiaccs
📄 https://cs.brown.edu/~vpk/papers/islab.asiaccs24.pdf
💾 https://github.com/tum-itsec/islab

🏆 #EPF (presented by Di Jin at @usenixassociation #ATC 2023) was the runner-up for the "Bug of the Year" award ("Weirdest Machine" category) at IEEE Symposium on Security and Privacy LangSec (Language-Theoretic Security) workshop 2024! #atc23 #LangSec
⌨️ https://langsec.org/spw24/bugs-of-the-year-awards.html
📄 https://cs.brown.edu/~vpk/papers/epf.atc23.pdf
💾 https://gitlab.com/brown-ssl/epf

🏅 I am honored and delighted to have received the "Distinguished Reviewer Award" at @acm_ccs #CCS2024!

🏅Alexander Gaidis has been awarded the "Distinguished Artifact Reviewer" award at the @usenixassociation Security Symposium 2024!
https://cs.brown.edu/news/2024/09/20/brown-cs-phd-student-alexander-j-gaidis-has-been-named-a-usenix-security-2024-distinguished-artifact-reviewer/
#usesec24 #proudadvisor

📢 I had the great pleasure of discussing some of these works recently at the Computer Systems Seminar at Boston University!
📽️ https://www.bu.edu/rhcollab/events/bu-systems-bu%E2%99%BAs-seminar/

#brownssl #browncs 🚀

Brown Secure Systems Lab · GitLab

https://brown-ssl.slack.com

GitLab
We uploaded the pre-print of our #AsiaCCS paper "Look What's There! Utilizing the Internet's Existing Data for Censorship Circumvention with OPPRESSION" https://researchgate.net/publication/377565939_Look_What's_There_Utilizing_the_Internet's_Existing_Data_for_Censorship_Circumvention_with_OPPRESSION
The idea is to use history covert channels (see here https://arxiv.org/abs/2212.11850) to point to existing data.

Congrats to @redrabbyte, @faulst, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler and @lavados for getting your paper "Generic and Automated Drive-by GPU Cache Attacks from the Browser" accepted at #AsiaCCS

The paper presents #GPU cache attacks from restricted #WebGPU contexts within web browsers. You can find the paper and a demo here:
https://www.ginerlukas.com/gpuattacks/

#webgpu #browser #nvidia #amd #cacheattack #sidechannel

GPU Attacks! Histogram

Meanwhile, our paper on censorship circumvention has been accepted at #AsiaCCS 2024! Congrats to All co-authors. Pre-print follows in the coming months.😃😃😃

Our new work on using #ebpf and #landlock to #sandbox native code in #JavaScript runtimes has been accepted at #RAID2023 ! 🚀
Check out the paper and the code at:

Paper: https://cs.unibg.it/seclab-papers/2023/RAID/natisand.pdf
Code: https://github.com/unibg-seclab/natisand

Take a look also at our previous work presented at #AsiaCCS 2023:

Paper: https://cs.unibg.it/seclab-papers/2023/ASIACCS/paper/cage4deno.pdf
Code: https://github.com/unibg-seclab/Cage4Deno

#deno #nodejs #security #lsm #linux

BinWrap won one of the Distinguished Paper awards at #ASIACCS 2023!! Extremely grateful to the technical program committee for this honor -- thank you, ASIACCS! #binwrap #brownssl
📢 Our work on hardening Node.js against memory-safety vulnerabilities in native (C/C++) add-ons has been accepted at #ASIACCS 2023! Joint work with Nikos Vasilakis, Sotiris Ioannidis, Aarno Labs, Grigoris Ntousakis, and George Christou! #binwrap #brownssl