Referred Journals and Conferences

  • A. Cathis, M. Luo, M. Tiwari, A. Gerstlauer, “Lifecycle-Aware Power-Based Malware Detection”, accepted to HOST, 2025. [pdf]

  • S. Banerjee *, P. Sahu *, M. Luo, A. Valhdiek-Oberwager, N. J. Yadwadkar, M. Tiwari. “SoK: Attack and Defense on Compound AI”, in submission. (* Equal contribution.) preprint.

  • A. RoyChowdhury*, M. Luo, et. al., “Confused Deputy Risks in RAG-based LLMs”, [pdf],[website].Security Magazine, Data Breach Today, CYBR Monk, Secure World.(* Undergrad student advised.)

  • M. Luo, M. Tiwari. “Towards Reinforcement Learning for Eviction-Set Finding for Randomized Caches”,SRC TECHCON, 2024.

  • J. Cui, X. Yang*, M. Luo*, G. Lee*, et. al., “MACTA: A Multi-agent Reinforcement Learning Approach for Cache Timing Attacks and Detection”, accepted to International Conference on Learning Representation (ICLR), 2023. [pdf] (* Equal contributions.),[code]

  • M. Luo*, W. Xiong*, et. al., “AutoCAT: Reinforcement Learning for Automated Exploration of Cache Timing-Channel Attacks”, accepted to IEEE International Symposium on High Performance Computer Architecture (HPCA), 2023. [pdf][code](* Equal contributions.)(Artifact Evaluated, Functional and Result Reproduced).

  • M. Luo, G. E. Suh, “Accelerating Path Planning for Autonomous Driving with Hardware-assisted Memorization”, in International conference on Application-specific Systems, Architectures and Processors (ASAP), 2022. [pdf]

  • M. Luo, G. E. Suh, “Interrupt Attack on TEE for Robotic Vehicles”, in Automobile and Autonomous Vehicle Security Workshop (AutoSec), 2022, collocated with Networked and Distributed System Symposium (NDSS). [pdf],[talk]

  • M. Luo, A. C. Myers, G. E. Suh, “Stealthy Tracking of Autonomous Vehicles with Cache Side Channels”, in 29th USENIX Security Symposium, 2020, pp.859-876 [pdf] [slides][talk] (Shortlisted for Top Picks in Hardware and Embedded Security 2022.)

  • J. H. Lin, X. Jiao, M. Luo, “Vulnerability of hardware neural networks to dynamic operation point variations”, in IEEE Design and Test, 2020. [pdf]

  • J. Liu, J. C. Davies, A. Ferraiuolo, A. Ivanov, M. Luo, et al., “Secure Autonomous Cyber-Physical Systems Through Verifiable Information Flow Control”, in Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC), collocated with ACM Conference on Computer and Communications Security (CCS), 2018, pages 48-59 (Best Paper Award). [pdf]

  • X. Jiao, M. Luo, J. H. Lin, R. K. Gupta, “An Assessment of Vulnerability of Hardware Neural Networks to Dynamic Voltage and Temperatrue Variations”, in Internaional Conference on Computer-Aided Design (ICCAD), 2017, 940-950. [pdf]

Tutorials

Invited Talks