Research
Thank you for your interest in my research works. I’m always happy to discuss them with you.
Research Interest
- Cybersecurity risks of Large Language Models (LLMs)
- Opportunities of adopting LLMs in security
- Trusted Execution Environments on multi-core devices
Publication
- S. Wan, C. Nikolaidis, D. Song, D. Molnar, J. Crnkovich, J. Grace, M. Bhatt, S. Chennabasappa, S. Whitman, S. Ding, V. Ionescu, Y. Li, J. Saxe. “CYBERSECEVAL 3: Advancing the Evaluation of Cybersecurity Risks and Capabilities in Large Language Models”. arXiv, 2024. [paper, GitHub]
- Llama Team, AI @ Meta (S. Wan as one of core contributors). “The Llama 3 Herd of Models”. arXiv, 2024. [paper]
- S. Wan, J. Saxe, C. Gomes, S. Chennabasappa, A. Rath, K. Sun, X. Wang. “Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia”. In proceedings of IEEE/IFIP DSN 2024, Industry Track. [paper]
- Meta GenAI Cybersec Team (S. Wan as one of co-equal primary authors). “CYBERSECEVAL 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models”. arXiv, 2024. [paper]
- Meta GenAI Cybersec Team (S. Wan as one of co-equal primary authors). “Purple Llama CYBERSECEVAL: A Secure Coding Benchmark for Language Models”. arXiv, 2023. [paper]
- J. Wang, K. Sun, L. Lei, Y. Wang, J. Jing, S. Wan, Q Li. “CacheIEE: Cache-assisted Isolated Execution Environment on ARM Multi-Core Platforms”. IEEE Transactions on Dependable and Secure Computing, 2023.
- Y. Xing, J. Cao, K. Sun, F. Yan, S. Wan. “The devil is in the detail: Generating system call whitelist for Linux seccomp”. Future Generation Computer Systems 135, 105-113, 2022.
- S. Wan, K. Sun, N. Zhang, and Y. Li. “Remotely Controlling TrustZone Applications? A Study on Securely and Resiliently Receiving Remote Commands”. In proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) 2021. [slides]
- S. Wan, M. Sun, K. Sun, N. Zhang, and X. He. “RusTEE: Developing Memory-Safe ARM TrustZone Applications”. In proceedings of Annual Computer Security Applications Conference (ACSAC) 2020. [slides, GitHub]
- J. Wang, K. Sun, L. Lei, S. Wan, Y. Wang, and J. Jing. “Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments”. In proceedings of ACM Conference on Computer and Communications Security (CCS) 2020.
- S. Wan, J. Sun, N. Zhang, K. Sun, and Q. Li. “SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors”. In proceedings of IEEE/IFIP DSN 2019. Received DSN 2019 Student Travel Award. [slides]
- S. Wan, Y. Li, and K. Sun. “PathMarker: Protecting Web Contents against Inside Crawlers”. Cybersecurity, 2(1), 2019.
- S. Wan, Y. Li, and K. Sun. “Protecting Web Contents against Persistent Distributed Crawlers”. In Proceedings of IEEE ICC 2017. [slides]
Service
- Journal reviewer: IEEE Transactions on Information Forensics and Security, IEEE/ACM Transactions on Networking, IEEE Internet Computing, ACM Digital Threats: Research and Practice, CCF Transactions on Networking.
- Conference reviewer: IEEE INFOCOM 2020, IEEE ICC 2019, IEEE CNS 2018/2016.
- Conference sub-reviewer: ICICS 2020/2019/2018, ICDCS 2020/2019, Securecomm 2018/2017, SciSec 2018.
Last updated: August, 2024