Research

Research

Publications

BulletCT: Towards More Scalable Ring Confidential Transactions With Transparent Setup

Nan Wang, Qianhui Wang, Dongxi Liu, Muhammed F. Esgin, Alsharif Abuadbba • USENIX Security 2025

TL;DR: BulletCT is a new Ring Confidential Transaction (RingCT) signature scheme in the discrete logarithm setting that does not require a trusted setup. It achieves greater scalability than state-of-the-art RingCT schemes. BulletCT features a novel K-out-of-N proof for strong anonymity and a tag proof that leverages permutation constraints to achieve linkability. Additionally, we identify key limitations in applying Any-out-of-N proofs to RingCT and address a critical flaw in prior constructions.

Talks

Enhancing Temporal Safety of CHERI-enabled Language Runtimes with ARM Memory Tagging Extension (MTE)

CASCADE showcase • 2026 March

Abstract: Using capability instructions for memory access enables deterministic traps of out-of-bounds and use-after-reallocation errors in the CHERI-enabled languages. However, benchmarking the CHERI-enabled CPython allocators reveals very prominent overheads due to the current CHERI temporal safety mechanism, which discourages industrial adoption. While sources of overheads could be the less-than-optimal revoker design, complex interaction of the quarantine and runtime allocator behaviours, we are motivated to explore adding ARM's memory tagging extension (MTE) to recolour freed memory allocations for immediate reuse. This approach aims to reduce the amount of memory quarantined and the frequency of revocation sweeps that installs bulk of memory and runtime overheads currently.

Hardware-Software Interface: How it contributes to better computer security

Woman in CS seminar • 2026 Feb

Abstract: Modern computer security relies heavily on software-based defences, including analysis tools that look for potential bugs and patches that fix reported vulnerabilities. Although safer programming languages and improved system designs have significantly reduced many risks, memory safety problems still remain as a major security concern, accounting for over 70% of serious vulnerabilities in Microsoft and Chromium codebases. In this talk, we explore how rethinking the boundary between hardware and software opens up exciting new opportunities for stronger security guarantees. We show how this interface represents a design space full of trade-offs, and how the design approach requires piecing together multiple layers of the computer to build a secure and practical system.

Algorithmic Mechanism Design: A New Frontier in Algorithmic Game Theory

Advanced Algorithms video tutorial • 2022 Oct

Abstract: Algorithmic mechanism design is a subfield of algorithmic game theory that focuses on designing algorithms and mechanisms to achieve desired outcomes in strategic settings. It combines techniques from computer science, economics, and game theory to create efficient and effective solutions for various problems, such as auctions, resource allocation, and social choice. In this talk, we will explore the fundamental concepts of algorithmic mechanism design, including incentive compatibility, social welfare maximisation, and computational complexity. We will also introduce some of the latest research developments in this exciting field and their applications in real-world scenarios.

More to come...