Research

Thank you for your interest in my research works. I’m always happy to discuss them with you.

Research Interest

  1. Cybersecurity risks of Large Language Models (LLMs)
  2. Opportunities of adopting LLMs in security
  3. Trusted Execution Environments on multi-core devices

Publication

  1. S. Wan, C. Nikolaidis, D. Song, D. Molnar, J. Crnkovich, J. Grace, M. Bhatt, S. Chennabasappa, S. Whitman, S. Ding, V. Ionescu, Y. Li, J. Saxe. “CYBERSECEVAL 3: Advancing the Evaluation of Cybersecurity Risks and Capabilities in Large Language Models”. arXiv, 2024. [paper, GitHub]
  2. Llama Team, AI @ Meta (S. Wan as one of core contributors). “The Llama 3 Herd of Models”. arXiv, 2024. [paper]
  3. S. Wan, J. Saxe, C. Gomes, S. Chennabasappa, A. Rath, K. Sun, X. Wang. “Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia”. In proceedings of IEEE/IFIP DSN 2024, Industry Track. [paper]
  4. Meta GenAI Cybersec Team (S. Wan as one of co-equal primary authors). “CYBERSECEVAL 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models”. arXiv, 2024. [paper]
  5. Meta GenAI Cybersec Team (S. Wan as one of co-equal primary authors). “Purple Llama CYBERSECEVAL: A Secure Coding Benchmark for Language Models”. arXiv, 2023. [paper]
  6. J. Wang, K. Sun, L. Lei, Y. Wang, J. Jing, S. Wan, Q Li. “CacheIEE: Cache-assisted Isolated Execution Environment on ARM Multi-Core Platforms”. IEEE Transactions on Dependable and Secure Computing, 2023.
  7. Y. Xing, J. Cao, K. Sun, F. Yan, S. Wan. “The devil is in the detail: Generating system call whitelist for Linux seccomp”. Future Generation Computer Systems 135, 105-113, 2022.
  8. S. Wan, K. Sun, N. Zhang, and Y. Li. “Remotely Controlling TrustZone Applications? A Study on Securely and Resiliently Receiving Remote Commands”. In proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) 2021. [slides]
  9. S. Wan, M. Sun, K. Sun, N. Zhang, and X. He. “RusTEE: Developing Memory-Safe ARM TrustZone Applications”. In proceedings of Annual Computer Security Applications Conference (ACSAC) 2020. [slides, GitHub]
  10. J. Wang, K. Sun, L. Lei, S. Wan, Y. Wang, and J. Jing. “Cache-in-the-Middle (CITM) Attacks : Manipulating Sensitive Data in Isolated Execution Environments”. In proceedings of ACM Conference on Computer and Communications Security (CCS) 2020.
  11. S. Wan, J. Sun, N. Zhang, K. Sun, and Q. Li. “SATIN: A Secure and Trustworthy Asynchronous Introspection on Multi-Core ARM Processors”. In proceedings of IEEE/IFIP DSN 2019. Received DSN 2019 Student Travel Award. [slides]
  12. S. Wan, Y. Li, and K. Sun. “PathMarker: Protecting Web Contents against Inside Crawlers”. Cybersecurity, 2(1), 2019.
  13. S. Wan, Y. Li, and K. Sun. “Protecting Web Contents against Persistent Distributed Crawlers”. In Proceedings of IEEE ICC 2017. [slides]

Service

  • Journal reviewer: IEEE Transactions on Information Forensics and Security, IEEE/ACM Transactions on Networking, IEEE Internet Computing, ACM Digital Threats: Research and Practice, CCF Transactions on Networking.
  • Conference reviewer: IEEE INFOCOM 2020, IEEE ICC 2019, IEEE CNS 2018/2016.
  • Conference sub-reviewer: ICICS 2020/2019/2018, ICDCS 2020/2019, Securecomm 2018/2017, SciSec 2018.

Last updated: August, 2024