As we welcome 2025, I'd like to take a moment to reflect on what an extraordinary year 2024 has been for Brown CS Secure Systems Lab (https://gitlab.com/brown-ssl/). It has been a year of innovation, creativity, and growth—both for the lab and for me personally as its director. Witnessing the passion, dedication, and brilliance of our team—Neophytos Christou, Alexander Gaidis, Marius Momeu, @dijin, and Vaggelis Atlidakis—has been truly fulfilling and inspiring!

In 2024, we tackled complex challenges and made significant strides in advancing our research on software hardening and OS kernel protection. Here are some highlights from this remarkable year:

✳️ Marius Momeu presented #SafeSlab at @acm_ccs #CCS2024. Safeslab hardens the Linux SLUB allocator against exploits that abuse use-after-free (#UaF) vulnerabilities, using #Intel #MPK. (Joint work with Technical University of Munich and @mikepo.)
📄 https://cs.brown.edu/~vpk/papers/safeslab.ccs24.pdf
💾 https://github.com/tum-itsec/safeslab

✳️ Neophytos Christou presented #Eclipse at @acm_ccs #CCS2024. Eclipse is a compiler-assisted framework that propagates artificial data dependencies onto sensitive data, preventing the CPU from using attacker-controlled input during speculative execution.
📄 https://cs.brown.edu/~vpk/papers/eclipse.ccs24.pdf
💾 https://gitlab.com/brown-ssl/eclipse

✳️ Di Jin presented #BeeBox at the @usenixassociation Security Symposium 2024. BeeBox hardens #Linux BPF/eBPF against transient execution attacks. #usesec24
📄 https://cs.brown.edu/~vpk/papers/beebox.sec24.pdf
💾 https://gitlab.com/brown-ssl/beebox

✳️ Yaniv David presented #Quack at the NDSS Symposium 2024. Quack hardens PHP code against deserialization attacks using a novel (static) duck typing-based approach. (Joint work with Andreas D Kellas and Junfeng Yang.) #NDSSsymposium2024
📄 https://cs.brown.edu/~vpk/papers/quack.ndss24.pdf
💾 https://github.com/columbia/quack

✳️ Marius Momeu presented #ISLAB at @ACM #ASIACCS24. ISLAB hardens SLAB-based (kernel) allocators, against memory errors, via SMAP-assisted isolation. (Joint work with Technical University of Munich and @mikepo.) #asiaccs
📄 https://cs.brown.edu/~vpk/papers/islab.asiaccs24.pdf
💾 https://github.com/tum-itsec/islab

🏆 #EPF (presented by Di Jin at @usenixassociation #ATC 2023) was the runner-up for the "Bug of the Year" award ("Weirdest Machine" category) at IEEE Symposium on Security and Privacy LangSec (Language-Theoretic Security) workshop 2024! #atc23 #LangSec
⌨️ https://langsec.org/spw24/bugs-of-the-year-awards.html
📄 https://cs.brown.edu/~vpk/papers/epf.atc23.pdf
💾 https://gitlab.com/brown-ssl/epf

🏅 I am honored and delighted to have received the "Distinguished Reviewer Award" at @acm_ccs #CCS2024!

🏅Alexander Gaidis has been awarded the "Distinguished Artifact Reviewer" award at the @usenixassociation Security Symposium 2024!
https://cs.brown.edu/news/2024/09/20/brown-cs-phd-student-alexander-j-gaidis-has-been-named-a-usenix-security-2024-distinguished-artifact-reviewer/
#usesec24 #proudadvisor

📢 I had the great pleasure of discussing some of these works recently at the Computer Systems Seminar at Boston University!
📽️ https://www.bu.edu/rhcollab/events/bu-systems-bu%E2%99%BAs-seminar/

#brownssl #browncs 🚀

Brown Secure Systems Lab · GitLab

https://brown-ssl.slack.com

GitLab

PhD student Florian Hirner at @ ACM CCS 2024 in Salt Lake City, USA, presenting the paper “Whipping the Multivariate-based MAYO Signature Scheme using Hardware Platforms”!

📃👉 https://eprint.iacr.org/2023/1267.pdf

#phd #tugraz #conference #CCS2024

Here is the code and data of our binary analysis technique ReSym https://github.com/lt-asset/resym Honoured to received the #CCS2024 Distinguished Paper Award!
GitHub - lt-asset/resym: For our CCS 2024 paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhuo Zhang, Nan Jiang, Xiangzhe Xu, Lin Tan, and Xiangyu Zhang.

For our CCS 2024 paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" by Danning Xie, Zhuo Zhang, Nan Jiang, Xiangzhe Xu, Lin Tan, and Xian...

GitHub

PhD candidate Fabian Rauscher @ ACM CCS 2024 in Salt Lake City, USA, presenting his paper “Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs”!

📃👉 https://fabianrauscher.com/papers/uintr.pdf

#phd #tugraz #conference #CCS2024 #informationsecurity #cybersecurity

📢 Off to #SaltLakeCity, #Utah for attending
@acm_ccs 2024! Brown Secure Systems Lab (https://gitlab.com/brown-ssl/) has a strong representation in #CCS2024:

* Marius Momeu will be presenting #SafeSlab: our work on hardening the Linux SLUB allocator, against exploits that abuse use-after-free (#UaF) vulnerabilities, using #Intel #MPK (Session 3-4, Software Security: Memory Safety and Error Detection) | https://cs.brown.edu/~vpk/papers/safeslab.ccs24.pdf | https://github.com/tum-itsec/safeslab. (Joint work with Technical University of Munich and Stony Brook University.)

* Neophytos Christou will be talking about #Eclipse: a compiler-assisted framework for hardening C/C++ applications against speculative memory-error abuse attacks (Session 8-4, Software Security: Program Analysis and Security Enhancement) | https://cs.brown.edu/~vpk/papers/eclipse.ccs24.pdf | https://gitlab.com/brown-ssl/eclipse. (Joint work with Alexander Gaidis and Vaggelis Atlidakis.)

Brown CS participates in ACM CCS with five papers in total this year! In addition to the above, if interested, take a look at the following great (crypto/applied crypto) papers:

- PathGES: An Efficient and Secure Graph Encryption Scheme for Shortest Path Queries (Session 8-5, Applied Crypto: Crypto Applied to cloud computing and machine learning)

- Reconstructing with Even Less: Amplifying Leakage and Drawing Graphs (Session 9-6, Applied Crypto: Customized cryptographic solutions)

- RSA-Based Dynamic Accumulator without Hashing into Primes (Session 9-1, Applied Crypto: Integrity and Authentication)

#brownssl | #eclipse | #safeslab | #CCS2024

Brown Secure Systems Lab · GitLab

https://brown-ssl.slack.com

GitLab
Excited to have shared our research on misinformation and network science at CCS 2024!
Great insights and inspiring conversations.
#CCS2024
#NetworkScience
#Misinformation

To those who attended #CCS2024 and those who didn't: If you are in the US Northeast area (or not), please come to our next #NERCCS2025!!
https://nerccs2025.github.io

This will be a great opportunity especially for young researchers. Full paper due 1/24, abstract due 2/28

NERCCS 2025: Eighth Northeast Regional Conference on Complex Systems

That's the wrap!! See you all in Siena next year.
#CCS2024
And the next #CCS2025 in Siena, Italy on Sep. 1-5, 2025
#CCS2024
Alex Arenas's take-home messages
#CCS2024