I am currently a postdoctoral researcher in the System Security Lab at TU Darmstadt, Germany, led by Prof. Dr.-Ing. Ahmad-Reza Sadeghi. I obtained my Ph.D. from TU Delft, the Netherlands, in 2023, under the supervision of Prof. Dr. Ir. Inald Lagendijk and Dr. Dr. Stjepan Picek, and previously held a postdoctoral research fellowship at Radboud University, led by Prof. Dr. Joan Daemen and Dr. Dr. Stjepan Picek. My research focuses on AI-augmented physical and micro-architectural hardware security, as well as AI security. I have published in top-tier security conferences such as USENIX Security, ASIACRYPT, TCHES, and TDSC, and was awarded the 2023 Informatics Best PhD Dissertation Award. Several of my works have been referenced in AIS 64 guidance by the German Federal Office for Information Security (BSI), and I have contributed as a main or co-applicant to several EU and industry-funded projects.
Alongside my academic research, I worked at 80% FTE as a Principal Security Evaluator at SGS Brightsight, the Netherlands (2017–2024). In this role, I led or was involved in several CC EAL5+ security evaluations from globally leading IC designers, focusing on their hardware and software implementation security. Additionally, I led R&D initiatives and collaborated with universities worldwide on research and innovation.
News
- April 2025: Serves as the programme committee of NDSS’26.
- January 2025: Our paper “GenHuzz: An Efficient Generative Hardware Fuzzer” was accepted at USENIX Security’25.
- January 2025: Serves as the programme committee of CCS’25.
- November 2024: Our paper “HFL: Hardware Fuzzing Loop with Reinforcement Learning” was accepted at Design, Automation and Test in Europe Conference (DATE)’25.
- October 2024: Serves as the programme committee of USENIX Security’25.
- August 2024: Our paper “It’s a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis” was accepted at ASIACRYPT’24.
- July 2024: Our paper “Leakage Model-flexible Deep Learning-based Side-channel Analysis” was accepted at IACR Communications in Cryptology (CiC)’24.
- July 2024: Our paper “Plaintext-based Side-channel Collision Attack” was accepted at IACR Communications in Cryptology (CiC)’24.
- April 2024: Our paper “Weakly Profiling Side-channel Analysis” was accepted at IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES)’24.