I am currently a postdoctoral researcher in the System Security Lab at TU Darmstadt, Germany, led by Prof. Dr.-Ing. Ahmad-Reza Sadeghi, and an incoming lecturer (assistant professor) at Bristol Cyber Security Group at the University of Bristol, UK. I obtained my Ph.D. from TU Delft, the Netherlands, in 2023, under the supervision of Prof. Dr. ir. Inald Lagendijk and Prof. Dr. Dr. Stjepan Picek, and previously held a postdoctoral research fellowship at Radboud University, led by Prof. Dr. Joan Daemen and Prof. Dr. Dr. Stjepan Picek. My research focuses on AI-augmented physical and micro-architectural hardware security, as well as AI security. I have published in top-tier security conferences such as USENIX Security, NDSS, ASIACRYPT, TCHES, and TDSC, and was awarded the 2023 Informatics Best PhD Dissertation Award. Several of my works have been referenced in AIS 64 guidance by the German Federal Office for Information Security (BSI), and I have contributed as a main or co-applicant to several EU and industry-funded projects.
Alongside my academic research, I worked as a Principal Security Evaluator at SGS Brightsight, the Netherlands (2017–2024). In this role, I led or was involved in several CC EAL5+ security evaluations from globally leading IC designers, focusing on their hardware and software implementation security. Additionally, I led R&D initiatives and collaborated with universities worldwide on research and innovation.
Papers
- [2025.07] Our paper “NeuroStrike: Neuron-Level Attacks on Aligned LLMs” was accepted at NDSS’26.
- [2025.07] Our paper “Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer” (to appear) was accepted at NDSS’26.
- [2025.07] Our paper “GoldenFuzz: Generative Golden Reference Hardware Fuzzing” (to appear) was accepted at NDSS’26.
- [2025.01] Our paper “GenHuzz: An Efficient Generative Hardware Fuzzer” was accepted at USENIX Security’25.
- [2024.11] Our paper “HFL: Hardware Fuzzing Loop with Reinforcement Learning” was accepted at Design, Automation and Test in Europe Conference (DATE)’25.
- [2024.08] Our paper “It’s a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis” was accepted at ASIACRYPT’24.
- [2024.07] Our paper “Leakage Model-flexible Deep Learning-based Side-channel Analysis” was accepted at IACR Communications in Cryptology (CiC)’24.
- [2024.07] Our paper “Plaintext-based Side-channel Collision Attack” was accepted at IACR Communications in Cryptology (CiC)’24.
- [2024.04] Our paper “Weakly Profiling Side-channel Analysis” was accepted at IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)’24.
Activities & Services
- [2025.10] Gives tutorial at ICCAD 2025.
- [2025.09] Co-chairs the Top Picks in Hardware and Embedded Security collocated with ICCAD 2025.
- [2025.09] Organizes the HACK@CHES 2025 collocated with CHES 2025, collaborated with Intel and Texas A&M University.
- [2025.06] Serves as the programme committee of USENIX Security’26.
- [2025.06] Serves as the programme committee of CHES’26.
- [2025.04] Serves as the programme committee of NDSS’26.
- [2025.03] Organizes the HACK@DATE 2025 collocated with DATE 2025, collaborated with Intel and Texas A&M University.
- [2025.01] Serves as the programme committee of CCS’25.
- [2024.10] Serves as the programme committee of USENIX Security’25.