News

Congratulations to Irene Lu!

CSRL published on

Congratulations to Irene Lu for successfully defending her MSc thesis! Irene's thesis, titled "Semantic-Aware Fuzzing: A Reasoning-Driven Framework for LLM-Guided Input Mutation", introduces a framework for integrating LLMs into the fuzzing mutation loop and empirically evaluates their potential to enhance fuzzing performance.

Read More

Congratulations to Jacqueline Chan!

CSRL published on

Congratulations to Jacqueline Chan for successfully defending her MSc thesis! Jacqueline's thesis, titled "Threshold-Based Password Management with Trusted Execution Environments", uses Trusted Execution Environements (TEEs) and threshold cryptography to protect passwords against compromised personal devices and enable secure sharing of secrets with other users.

Read More

Congratulations to Siam Antar!

CSRL published on

Congratulations to Siam Antar for successfully defending his MSc thesis! Siam's thesis, titled "Pioneering Autonomous Penetration Testing With Large Language Models Through Prompt Engineering and Agentic System Design", introduces a phase-driven prompting methodology to guide LLMs through the Cyber Kill Chain. His research demonstrates the viability of LLM-assisted autonomous penetration testing and continuous cybersecurity posture monitoring.

Read More

Congratulations to Aadarsh Sreekumar!

CSRL published on

Congratulations to Aadarsh Sreekumar for the successful completion of his MSc project! Aadarsh's project, titled "A Verifiable Delivery Framework for Web Applications That Use Trusted Execution Environments", leverages Meta's Code Verify browser extension to implement trustworthy delivery and client-side verifiability for web applications that rely on server-side Trusted Execution Environments (TEEs) to provide security guarantees.

Read More

Congratulations to Nafiz Sadman!

CSRL published on

Congratulations to Nafiz Sadman for successfully defending his MSc thesis! Nafiz's thesis, titled "DepthPulse: A Passive Liveness Detection Framework for Face Presentation Attacks", contributes to strengthening face-recognition based user authentication systems against presentation attacks (also known as spoofing attacks).

Read More