Publications
[P25]. Mengmei Ye, Sandhya Koteshwara, Derren Dunn, Hubertus Franke, Chris Porter, Tobin Feldman-Fitzthum, Angelo Ruocco, Daniele Buono, Claudio Carvalho. “Position Paper: From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) Ride.” The International Workshop on Hardware and Architectural Support for Security and Privacy (HASP) in conjunction with IEEE/ACM International Symposium on Microarchitecture (MICRO), November 2024.
[P24] Apoorve Mohan, Mengmei Ye, Hubertus Franke, Mudhakar Srivatsa, Zhuoran Liu and Nelson Gonzale. “Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready?” IEEE International Conference on Cloud Computing (CLOUD), July 2024. (Acceptance rate: 19.4%) [PDF]
[P23] Wei Ren, Sandhya Koteshwara, Mengmei Ye, Hubertus Franke and Deming Chen. “S2TAR-Cloud: Shared Secure Trusted Accelerators with Reconfiguration for Machine Learning in the Cloud.” IEEE International Conference on Cloud Computing (CLOUD), July 2024. (Acceptance rate: 19.4%) [PDF]
[P22] Angelo Ruocco, Chris Porter, Claudio Carvalho, Daniele Buono, Derren Dunn, Hubertus Franke, James Bottomley, Marcio Silva, Mengmei Ye, Niteesh Dubey, and Tobin Feldman-Fitzthum (author list ordered by alphabet). “Aligning Confidential Computing with Cloud-native ML Platforms.” Workshop on Artificial Intelligence System with Confidential Computing (AISCC), co-located with Network and Distributed System Security (NDSS) Symposium, February 2024. [PDF]
[P21] Vikram Narayanan, Claudio Carvalho, Angelo Ruocco, Gheorghe Almási, James Bottomley, Mengmei Ye, Tobin Feldman-Fitzthum, Daniele Buono, Hubertus Franke, Anton Burtsev. “Remote Attestation of Confidential VMs Using Ephemeral vTPMs.” Annual Computer Security Applications Conference (ACSAC), December 2023. (Acceptance rate: 24%. Distinguished Paper with Artifacts
) [PDF]
[P20] (Exhibitor Forum) Mengmei Ye, Derren Dunn. “The Cost of Flexibility and Security in Cloud-Based HPC – A Case Study Running EDA Workloads with Confidential Computing Technology.” International Conference for High Performance Computing, Networking, Storage, and Analysis (SC), November 2023. [Details]
[P19] Mengmei Ye, Angelo Ruocco, Daniele Buono, James Bottomley, and Hubertus Franke. “Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the Cloud.” IEEE International Conference on Cloud Computing (IEEE CLOUD), July 2023. [PDF][Code]
[P18] Wei Ren, William Kozlowski, Sandhya Koteshwara, Mengmei Ye, Hubertus Franke, Deming Chen. “AccShield: A New Trusted Execution Environment with Machine-Learning Accelerators.” Design Automation Conference (DAC), July 2023. (Acceptance rate: 23%) [PDF]
[P17] (Presentation) Mengmei Ye, Angelo Ruocco. “No More Turtles: The SecondaryVM Framework - An Alternative to Nested Virtualization.” KVM Forum, September 2022. [Details]
[P16] (Blog Post) Mengmei Ye, Angelo Ruocco, Daniele Buono, James Bottomley, Hubertus Franke. “An Alternative to Nested Virtualization - Why It’s Time To “Free the Turtles.” IBM Research Blog, September 2022. [Details]
[P15] Mengmei Ye, Zhongze Tang, Huy Phan, Yi Xie, Bo Yuan, Sheng Wei, “Visual Privacy Protection in Mobile Image Recognition Using Protective Perturbation.” ACM Multimedia Systems Conference (MMSys), June 2022. [PDF][Code]
[P14] (Blog Post) Jaime H. Moreno, Hubertus Franke, Paul Crumley, Mengmei Ye, “Calling for the Return of Non-Virtualized Microprocessor Systems.” ACM SIGARCH, May 2022. [Details]
[P13] Xianglong Feng, Yi Xie, Mengmei Ye, Zhongze Tang, Bo Yuan, Sheng Wei, “Fake Gradient: A Security and Privacy Protection Framework for DNN-based Image Classification.” ACM Multimedia Conference (MM), October 2021. (Acceptance rate: 542/1942 = 27.9%) [PDF][Code]
[P12] Xianglong Feng, Mengmei Ye, Ke Xia, Sheng Wei, “Runtime Fault Injection Detection for FPGA-based DNN Execution Using Siamese Path Verification.” Design, Automation and Test in Europe Conference (DATE), February 2021. [PDF]
[P11] Akshay Gangal, Mengmei Ye, Sheng Wei, “HybridTEE: Secure Mobile DNN Execution Using Hybrid Trusted Execution Environment.” IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), December 2020. (Acceptance rate: 13/48 = 27.1%) [PDF] [Code]
[P10] Mengmei Ye, Xianglong Feng, Sheng Wei, “Runtime Hardware Security Verification Using Approximate Computing: A Case Study on Video Motion Detection.” IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), December 2019. [PDF]
[P9] Mengmei Ye, Xianglong Feng, Sheng Wei, “HISA: Hardware Isolation-based Secure Architecture for CPU-FPGA Embedded Systems.” International Conference on Computer Aided Design (ICCAD), November 2018. (Acceptance rate: 98/396 = 24.7%) [PDF] [Code]
[P8] Mengmei Ye, Myra B. Cohen, Witawas Srisa-An, Sheng Wei, “EvoIsolator: Evolving Program Slices for Hardware Isolation Based Security.” Hot off the Press track in Symposium on Search-Based Software Engineering (SSBSE), September 2018. [PDF]
[P7] Mengmei Ye, Jonathan Sherman, Witawas Srisa-an, Sheng Wei, “TZSlicer: Security-Aware Dynamic Program Slicing for Hardware Isolation.” IEEE International Symposium on Hardware Oriented Security and Trust (HOST), May 2018. (Acceptance rate 17/84 = 20.2%. Best Paper Nomination
) [PDF] [Code]
[P6] Mengmei Ye, Mehrdad Zaker Shahrak, Sheng Wei, “PUFSec: Protecting Physical Unclonable Functions Using Hardware Isolation-based System Security Techniques.” IEEE Asian Hardware Oriented Security and Trust Symposium (AsianHOST), October 2017. [PDF]
[P5] Xianglong Feng, Mengmei Ye, Viswanathan Swaminathan, Sheng Wei, “Towards the Security of Motion Detection-based Video Surveillance on IoT Devices.” ACM Multimedia Conference - Thematic Workshop, October 2017. [PDF]
[P4] Mengmei Ye, Nan Jiang, Hao Yang, Qiben Yan, “Security Analysis of Internet-of-Things: A Case Study of August Smart Lock.” IEEE INFOCOM - Workshop on the Security, Privacy, and Digital Forensics of Mobile Systems and Networks (MobiSec), May 2017. [PDF]
[P3] Mengmei Ye, Nianhang Hu, Sheng Wei, “Lightweight Secure Sensing Using Hardware Isolation.” IEEE SENSORS, October 2016. [PDF]
[P2] Nianhang Hu, Mengmei Ye, Sheng Wei, “Surviving Information Leakage Hardware Trojan Attacks Using Hardware Isolation.” IEEE International Conference on Computer Design (ICCD), October 2016. (Acceptance rate: 28.8%. Best Paper Award
in “Test, Verification, and Security” Track. The paper was published in IEEE Transactions on Emerging Topics in Computing (TETC).) [PDF]
[P1] Mehrdad Zaker Shahrak, Mengmei Ye, Viswanathan Swaminathan, Sheng Wei, “Two-Way Real Time Multimedia Stream Authentication Using Physical Unclonable Functions.” IEEE Workshop on Multimedia Signal Processing (MMSP), September 2016. [PDF]