July 2022
Started to work with Mr. Hongbo Chen, Dr. Mingshen Sun, and Prof. XiaoFeng Wang on TEE research!

Feb 2023
USENIX 2023 Paper submitted!

Mar 2023
My bachelor thesis submitted to Cybersecurity!

May 2023
I got accepted to GSoC 2023!

Haobin (Hiroki) Chen 

Phone: +1 812-325-6706
Address: 3025V, Luddy Hall, 700 N Woodlawn Ave., Bloomington, IN, U.S.A.



Haobin Hiroki Chen is a first-year CS Ph.D. student at Indiana University Bloomington. He is now being advised by Prof. XiaoFeng Wang. He was previously advised by Prof. Zheli Liu.

His research interests lie in the area of computer security, and system security, especially the intersecting point of theoretical and practical security. He is now focusing on formal methods and Programming Language Theory.


Indiana University at Bloomington (IUB)
Ph.D Student in Computer Science      Aug. 2023 - 2028 (Expected), Bloomington, IN, U.S.
Advisor: Prof. XiaoFeng Wang
Nankai University (NKU)
B.Eng. in Information Security      Aug. 2019 - Jun. 2023, Tianjin, P.R.C.
Advisor: Prof. Zheli Liu


USENIX Security 2023  
Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang.
A Verified Confidential Computing as a Service Framework for Privacy Preservation   



Research Assistant, @ IUB, Aug. 2023 -
Advisior: Prof. XiaoFeng Wang
    Currently doing research on data privacy (e.g., differential privacy), formal methods, and broad topics on TEEs and system security.
Developer Intern, Remote @ GSoc & ASF, Jun. 2023 - Nov. 2023 (expected)
Advisior: Dr. Mingshen sun
    Apache Teaclave (incubating) is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple. Our goal is to make the computation on the Teaclave platform privacy policy (or legal regulations) compliant because emphasis on privacy concerns is becoming more significant.
Research Intern, Remote @ IUB, Jul. 2022 - July 2023
Advisior: Prof. XiaoFeng Wang (Center for Distributed Confidental Computing (CDCC)) and Dr. Mingshen Sun.
Code: GitHub
  • Proof of Being Forgotten. This is a Rust-SGX based verification framework for TEE-enabled computing platforms. Our goal is to offer an off-the-shelf solution for providing users that the enclave application is verified under the specifications of Proof of Being Forgotten (PoBF) (check the talk offered by Dr. Mingshen Sun).
Research Intern, Nankai University & Huawei Inc., Sept. 2020 - Aug. 2022
Advisior: Prof. Zheli Liu (Data Privacy Lab)
Code: GitHub1 ; GitHub2
  • Encrypted Database. Our goal is to construct a fully encrypted database that allows for efficiency query on ciphertext while providing strong security guarantees with the support of TEEs (e.g., Intel SGX).
  • Next-Generation Oblivious RAM. Our goal is to design Oblivious RAM with the support of Trusted Execution Environment (TEE) and provide protection against access pattern leakage for the databases.
  • Searchable Symmetric Encryption. Our goal is to design a more secure SEE algorithm both backward and forward secure.
  • Frequency Smoothing Encryption. To fix the loopholes incurred by insecure deterministic encryptions, we propose the frequency-smoothing notion that "smooth"es out the frequency information of the ciphertext dataset that mitigates inference attacks.

Open-Source Projects

Oblivious-RAM: Reference Implementation for Different ORAM algorithms
Code: GitHub
Implemented the following ORAM algorithms:
NeoOS: A tiny OS kernel for x86-64
Code: GitHub
Awesome features:
  • X2Apic support
  • Can boot multiple CPU cores; SMP scheduling coming soon
  • Apple Filesystem (APFS) support (although at an early stage)
  • Unix syscall support
  • Support for many user-level apps: Rust, C, busybox, nginx, etc.
  • (To be done) Support SGX driver
This project was launched mainly because I wanted to build an OS from scratch to learn the details on how OS works. A long-term goal that I want to achieve is to build a kernel (microkernel, very likely) to serve as a meditator for running multiple TEEs (SEV, TDX, SGX, TrustZone) on a single machine using Rust, and many components from this kernel can be used to ease the build of a new kernel.
Prusti: A static verifier for Rust
Code: GitHub
Contributed to the project launched by ETHz.
Code: GitHub
An implementation of the paper SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
C compiler for ARM-v7 architecture
Code: GitHub
A compiler for SysY (a C-like language).
We used Bison as front-end parser and mimicked LLVM to implement the CodeGen.
A Novel Cryptographic Primitive for Encrypted Databases
Code: GitHub
We propose a notion of frequency-smoothing encryption that aims to strike a balance between security and data utility. The code is a Proof-of-Concept (PoC) and is written in Rust, backed by MongoDB.


The 3rd prize at the National College Student Information Security Contest,   2021   
- Ministriy of Education, China
Nankai Academically Excellent Student Scholarship,   2021, 2022   
- Nankai University, China
Nankai Innovation Award of Technology and Research Scholarship  2021, 2022   
- Nankai University, China
Distinguished Thesis Honor  2023   
- Nankai University, China
The 3rd Prize and Regional Outstanding Award at the National Contest for OS Design and Implementation (as mentor)  2023   
- China


Hongbo Chen(IUB); Xin'an Emmanuel Zhou (UCR); Hang Yang (GaTech); Mingshen Sun (TikTok Inc.)

Last update: 9/5/2023. Webpage template borrows from Xiangnan He.