News


Feb 2023
USENIX 2023 Paper submitted!

Mar 2023
My bachelor thesis submitted to Cybersecurity!

May 2023
I got accepted to GSoC 2023!

Aug 2023
Our PoBF paper was accepted to USENIX Security 2023!

Apr 2024
I am serving on the ACM CCS 2024 Artifact Evaluation Committee.

May 2024
I am about to start the internship at TikTok Inc. Excited to you guys in bay area.

Haobin (Hiroki) Chen 


Phone: +1 812-325-6706
Email: haobchen@iu.edu
Address: 3025V, Luddy Hall, 700 N Woodlawn Ave., Bloomington, IN, U.S.A., 47408


CVGitHub

About

Haobin Hiroki Chen is a first-year CS Ph.D. student at Indiana University Bloomington advised by Prof. XiaoFeng Wang.

Computer and system security researcher. PL enthusiast.
"Algorithms are the computational content of proofs." – Robert Harper

Lemma extensionality:
  ∀ {A: Type} (x y: A) (P: A → Prop) (_: x = y) -> P x → P y.

Education

Indiana University at Bloomington (IUB)
Ph.D Student in Computer Science      Aug. 2023 - 2028 (Expected), Bloomington, IN, USA
Advisor: Prof. XiaoFeng Wang
Nankai University (NKU)
B.Eng. in Information Security      Aug. 2019 - Jun. 2023, Tianjin, P.R.C.
Advisor: Prof. Zheli Liu

Publications

USENIX Security 2023 (Sec'23)  
Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang.
A Verified Confidential Computing as a Service Framework for Privacy Preservation   
  

     

Experiences

Research Assistant, @ IUB, Aug. 2023 -
Advisior: Prof. XiaoFeng Wang
    Currently doing research on data privacy (e.g., differential privacy), formal methods, and broad topics on TEEs and system security.
Research Intern @ Privacy Innovation Lab, TikTok Inc., San Jose, CA, May 2024 - Aug 2024 (expected)
Mentor: Dr. Mingshen Sun
TBD.
Contributor, Remote @ GSoC & ASF, Jun. 2023 - Nov. 2023
Advisior: Dr. Mingshen sun
Code:
GitHub
    Apache Teaclave (incubating) is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple. Our goal is to make the computation on the Teaclave platform privacy policy (or legal regulations) compliant because emphasis on privacy concerns is becoming more significant.
Research Intern, Remote @ IUB, Jul. 2022 - July 2023
Advisior: Prof. XiaoFeng Wang (Center for Distributed Confidental Computing (CDCC))
Code: GitHub
  • Proof of Being Forgotten. This is a Rust-SGX based verification framework for TEE-enabled computing platforms. Our goal is to offer an off-the-shelf solution for providing users that the enclave application is verified under the specifications of Proof of Being Forgotten (PoBF) (check the talk offered by Dr. Mingshen Sun).
Research Intern, Nankai University & Huawei Inc., Sept. 2020 - Aug. 2022
Advisior: Prof. Zheli Liu (Data Privacy Lab)
Code: GitHub1 ; GitHub2
  • Encrypted Database. Our goal is to construct a fully encrypted database that allows for efficiency query on ciphertext while providing strong security guarantees with the support of TEEs (e.g., Intel SGX).
  • Next-Generation Oblivious RAM. Our goal is to design Oblivious RAM with the support of Trusted Execution Environment (TEE) and provide protection against access pattern leakage for the databases.
  • Searchable Symmetric Encryption. Our goal is to design a more secure SEE algorithm both backward and forward secure.
  • Frequency Smoothing Encryption. To fix the loopholes incurred by insecure deterministic encryptions, we propose the frequency-smoothing notion that "smooth"es out the frequency information of the ciphertext dataset that mitigates inference attacks.

Open-Source Projects

Oblivious-RAM: Reference Implementation for Different ORAM algorithms
Code: GitHub
Implemented the following ORAM algorithms:
NeoOS: A tiny OS kernel for x86-64
Code: GitHub
Awesome features:
  • X2Apic support
  • Can boot multiple CPU cores; SMP scheduling coming soon
  • Apple Filesystem (APFS) support (although at an early stage)
  • Unix syscall support
  • Support for many user-level apps: Rust, C, busybox, nginx, etc.
  • (To be done) Support SGX driver
This project was launched mainly because I wanted to build an OS from scratch to learn the details on how OS works. A long-term goal that I want to achieve is to build a kernel (microkernel, very likely) to serve as a meditator for running multiple TEEs (SEV, TDX, SGX, TrustZone) on a single machine using Rust, and many components from this kernel can be used to ease the build of a new kernel.
Prusti: A static verifier for Rust
Code: GitHub
Contributed to the project launched by ETHz.
SSE-SEAL
Code: GitHub
An implementation of the paper SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
C compiler for ARM-v7 architecture
Code: GitHub
A compiler for SysY (a C-like language).
We used Bison as front-end parser and mimicked LLVM to implement the CodeGen.
A Novel Cryptographic Primitive for Encrypted Databases
Code: GitHub
We propose a notion of frequency-smoothing encryption that aims to strike a balance between security and data utility. The code is a Proof-of-Concept (PoC) and is written in Rust, backed by MongoDB.

Honors

The 3rd prize at the National College Student Information Security Contest,   2021   
- Ministriy of Education, China
Nankai Academically Excellent Student Scholarship,   2021, 2022   
- Nankai University, China
Nankai Innovation Award of Technology and Research Scholarship  2021, 2022   
- Nankai University, China
Distinguished Thesis Honor  2023   
- Nankai University, China
The 3rd Prize and Regional Outstanding Award at the National Contest for OS Design and Implementation (as mentor)  2023   
- China



Links


Hongbo Chen(IUB); Haosen Guan (Princeton); Xin'an Emmanuel Zhou (UCR); Hang Yang (GaTech); Mingshen Sun (TikTok Inc.)


Last update: 11/26/2023. Webpage template borrows from Xiangnan He.