Hello, I am

Yuan Xiao

Assistant Professor | ShanghaiTech University

Who am I ?

Assistant Professor @ ShanghaiTech University

I got my PhD from the Ohio State University and BE from Shanghai Jiao Tong University. Prior to the current job, I worked for Intel Labs for 4 years. My research lies primarily in low-level system security. A special focus is in software-triggered (micro-)architectural vulnerabilities and Trusted Execution Environments (TEE).

Personal Info

  • Email : xiaoyuan@shanghaitech.edu.cn
  • Phone : +86 (021) 20684602
  • Address : SIST Building 1C - 503B

Research Interest

Side-channel & Transient Execution Attacks

Trusted Execution Environment (TEE)

Systematic and automatic analytic tools

Keywords

(Micro-) Architecture, Side-channel Attacks, Trusted Execution Environments, x86, RISC-V, Networking, Cloud Computing, Edge Computing, Mobile Computing, IoT


My Resume

Education

2015 - 2020

Ph.D., Computer Science and Engineering

The Ohio State University, Columbus OH, US


2011 - 2015

Bachelor in Engineering, Information Security

Shanghai Jiao Tong University, Shanghai, China

Work

2025 - Present

Assistant Professor

ShanghaiTech University, Shanghai, China


2020 - 2024

Research Scientist

Intel Labs, Hillsboro OR, US

News

Recruiting graduate students

There are graduate student openings for 2025. Please feel free to email me if interested.

My Team

Publications

[NDSS 2024] SENSE: Enhancing Microarchitectural Awareness for TEEs via Subscription-Based Notification

Fan Sang, Jaehyuk Lee, Xiaokuan Zhang, Meng Xu, Scott Constable, Yuan Xiao, Michael Steiner, Mona Vij, Taesoo Kim


[US Patent 12093432, 2024] Techniques and technologies to address malicious single-stepping and zero-stepping of trusted execution environments

Scott Constable, Yuan Xiao, Bin Xing, Mona Vij, Mark Shanahan


[USENIX Security 2023] AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves

Scott Constable, Jo Van Bulck, Xiang Cheng, Yuan Xiao, Cedric Xing, Ilya Alexandrovich; Taesoo Kim, Frank Piessens, Mona Vij, Mark Silberstein


[ISCA 2023] TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution Environments

Moein Ghaniyoun, Kristin Barber, Yuan Xiao, Yinqian Zhang, Radu Teodorescu


[US Patent 17948829, 2023] Method for adding security features to sgx via patch on platforms that support patch rollback

Scott Constable, Ilya Alexandrovich, Ittai Anati, Simon Johnson, Vincent Scarlata, Mona Vij, Yuan Xiao, Bin Xing, Krystof Smudzinski


[US Patent 17561412, 2023] Efficient exception handling in trusted execution environments

Scott Constable, Bin Xing, Yuan Xiao, Krystof Zmudzinski, Mona Vij, Mark Shanahan, Francis McKeen, Ittai Anati


[SEED 2022] ENCLYZER: Automated Analysis of Transient Data Leaks on Intel SGX

Jiuqin Zhou, Yuan Xiao, Radu Teodorescu, Yinqian Zhang


[Intel Patent 2021] Unpublished Intel Patent (Filed)

[Ph.D. Dissertation 2020] Automatic and Systematic Detection of Software-exploitable Hardware Vulnerabilities

Yuan Xiao


[NDSS 2020] SpeechMiner: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities

Yuan Xiao, Yinqian Zhang, Radu Teodorescu


[NDSS 2019] OBFSCURO: A Commodity Obfuscation Engine on Intel SGX

Adil Ahmad, Byunggill Joe, Yuan Xiao, Yinqian Zhang, Insik Shin, Byoungyoung Lee


[EuroS&P 2019] SgxPectre Attacks: Stealing Intel Secrets from SGX Enclaves via Speculative Execution

Guoxing Chen, Sanchuan Chen, Yuan Xiao, Yinqian Zhang, Zhiqiang Lin, Ten H. Lai


[CCS 2017] Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves

Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang


[CCS 2016] Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices

Xiaokuan Zhang, Yuan Xiao, Yinqian Zhang


[USENIX Security 2016] One Bit Flips, One Cloud Flops: Cross-VM Row Hammer Attacks and Privilege Escalation

Yuan Xiao, Xiaokuan Zhang, Yinqian Zhang, Radu Teodorescu