Feb 2023
USENIX 2023 Paper submitted!

Mar 2023
My bachelor thesis submitted to Cybersecurity!

May 2023
I got accepted to GSoC 2023!

Aug 2023
Our PoBF paper was accepted to USENIX Security 2023!

Apr 2024
I am serving on the ACM CCS 2024 Artifact Evaluation Committee.

May 2024
I am about to start the internship at TikTok Inc. Excited to you guys in bay area.

Haobin (Hiroki) Chen 

Phone: +1 812-325-6706
Address: 3025V, Luddy Hall, 700 N Woodlawn Ave., Bloomington, IN, U.S.A., 47408



Haobin Hiroki Chen is a first-year CS Ph.D. student at Indiana University Bloomington advised by Prof. XiaoFeng Wang.

Computer and system security researcher. PL enthusiast.
"Algorithms are the computational content of proofs." – Robert Harper

Lemma extensionality:
  ∀ {A: Type} (x y: A) (P: A → Prop) (_: x = y) -> P x → P y.


Indiana University at Bloomington (IUB)
Ph.D Student in Computer Science      Aug. 2023 - 2028 (Expected), Bloomington, IN, USA
Advisor: Prof. XiaoFeng Wang
Nankai University (NKU)
B.Eng. in Information Security      Aug. 2019 - Jun. 2023, Tianjin, P.R.C.
Advisor: Prof. Zheli Liu


USENIX Security 2023 (Sec'23)  
Hongbo Chen, Haobin Hiroki Chen, Mingshen Sun, Kang Li, Zhaofeng Chen, XiaoFeng Wang.
A Verified Confidential Computing as a Service Framework for Privacy Preservation   



  • PC @ ACM CCS AEC 2024
  • Experiences

    Research Assistant, @ IUB, Aug. 2023 -
    Advisior: Prof. XiaoFeng Wang
      Currently doing research on data privacy (e.g., differential privacy), formal methods, and broad topics on TEEs and system security.
    Research Intern @ Privacy Innovation Lab, TikTok Inc., San Jose, CA, May 2024 - Aug 2024 (expected)
    Mentor: Dr. Mingshen Sun
    Contributor, Remote @ GSoC & ASF, Jun. 2023 - Nov. 2023
    Advisior: Dr. Mingshen sun
      Apache Teaclave (incubating) is an open source universal secure computing platform, making computation on privacy-sensitive data safe and simple. Our goal is to make the computation on the Teaclave platform privacy policy (or legal regulations) compliant because emphasis on privacy concerns is becoming more significant.
    Research Intern, Remote @ IUB, Jul. 2022 - July 2023
    Advisior: Prof. XiaoFeng Wang (Center for Distributed Confidental Computing (CDCC))
    Code: GitHub
    • Proof of Being Forgotten. This is a Rust-SGX based verification framework for TEE-enabled computing platforms. Our goal is to offer an off-the-shelf solution for providing users that the enclave application is verified under the specifications of Proof of Being Forgotten (PoBF) (check the talk offered by Dr. Mingshen Sun).
    Research Intern, Nankai University & Huawei Inc., Sept. 2020 - Aug. 2022
    Advisior: Prof. Zheli Liu (Data Privacy Lab)
    Code: GitHub1 ; GitHub2
    • Encrypted Database. Our goal is to construct a fully encrypted database that allows for efficiency query on ciphertext while providing strong security guarantees with the support of TEEs (e.g., Intel SGX).
    • Next-Generation Oblivious RAM. Our goal is to design Oblivious RAM with the support of Trusted Execution Environment (TEE) and provide protection against access pattern leakage for the databases.
    • Searchable Symmetric Encryption. Our goal is to design a more secure SEE algorithm both backward and forward secure.
    • Frequency Smoothing Encryption. To fix the loopholes incurred by insecure deterministic encryptions, we propose the frequency-smoothing notion that "smooth"es out the frequency information of the ciphertext dataset that mitigates inference attacks.

    Open-Source Projects

    Oblivious-RAM: Reference Implementation for Different ORAM algorithms
    Code: GitHub
    Implemented the following ORAM algorithms:
    NeoOS: A tiny OS kernel for x86-64
    Code: GitHub
    Awesome features:
    • X2Apic support
    • Can boot multiple CPU cores; SMP scheduling coming soon
    • Apple Filesystem (APFS) support (although at an early stage)
    • Unix syscall support
    • Support for many user-level apps: Rust, C, busybox, nginx, etc.
    • (To be done) Support SGX driver
    This project was launched mainly because I wanted to build an OS from scratch to learn the details on how OS works. A long-term goal that I want to achieve is to build a kernel (microkernel, very likely) to serve as a meditator for running multiple TEEs (SEV, TDX, SGX, TrustZone) on a single machine using Rust, and many components from this kernel can be used to ease the build of a new kernel.
    Prusti: A static verifier for Rust
    Code: GitHub
    Contributed to the project launched by ETHz.
    Code: GitHub
    An implementation of the paper SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage.
    C compiler for ARM-v7 architecture
    Code: GitHub
    A compiler for SysY (a C-like language).
    We used Bison as front-end parser and mimicked LLVM to implement the CodeGen.
    A Novel Cryptographic Primitive for Encrypted Databases
    Code: GitHub
    We propose a notion of frequency-smoothing encryption that aims to strike a balance between security and data utility. The code is a Proof-of-Concept (PoC) and is written in Rust, backed by MongoDB.


    The 3rd prize at the National College Student Information Security Contest,   2021   
    - Ministriy of Education, China
    Nankai Academically Excellent Student Scholarship,   2021, 2022   
    - Nankai University, China
    Nankai Innovation Award of Technology and Research Scholarship  2021, 2022   
    - Nankai University, China
    Distinguished Thesis Honor  2023   
    - Nankai University, China
    The 3rd Prize and Regional Outstanding Award at the National Contest for OS Design and Implementation (as mentor)  2023   
    - China


    Hongbo Chen(IUB); Haosen Guan (Princeton); Xin'an Emmanuel Zhou (UCR); Hang Yang (GaTech); Mingshen Sun (TikTok Inc.)

    Last update: 04/24/2023. Webpage template borrows from Xiangnan He.