As an intern, I implemented support for control flow integrity in the WebAssembly compiler toolchain, and closed-case debugging over USB type-C for the Chromebook Pixel 2, both while at Google. I also helped develop a GDB-compatible debugging stub for Android, and a pilot secure Linux-based voting machine platform using Buildroot for a pilot secure design competition, at Sandia National Laboratories.
During my undergraduate at Arizona State University, I worked on a security analysis of processor microcode with Gail-Joon Ahn, and developed a submersible for exploring subglacial lakes in Antarctica with the late Alberto Behar. I also spent a summer at Imperial College London, where I developed a teaching module on verifying security properties of various network protocols with Michael Huth, and contributed to the development of KLEE with Cristian Cadar.
A framework for enforcing integrity-based security policies, using a hardware-enforced AppendWrite inter-process communication primitive between a monitored program and an external verifier. We implement our IPC primitive in a PCIe-based FPGA, and in the microarchitecture via modeling and simulation. For performance, both programs execute concurrently, and synchronize only at system calls to prevent potentially-compromised programs from affecting externally-visible side effects. As a case study, we enforce a strong pointer-integrity-based control-flow integrity policy, and evaluate the correctness, effectiveness, and performance of our HQ-CFI design against past work on a variety of benchmarks.
A software-based transactional memory system that supports incremental repair of concurrency conflicts, instead of aborting and rolling back a transaction. To do so, we design a finer-grained dependency tracking mechanism in the transactional runtime, define the semantics for optional repair handlers, and extend the conflict detection algorithm to verify that all repairs are complete. We evaluate our system on a set of benchmark programs, against a baseline system that does not support repair.
An automated and scalable system for emulation and dynamic analysis of Linux-based embedded firmware, using the QEMU emulator, modified Linux kernels (v2.6.32, v4.1), and a custom userspace NVRAM emulator. In conjunction with 14 previously-unknown vulnerabilities that I discovered, and 60 known vulnerabilities selected from the Metasploit Framework, we showed that over a dataset of 9,486 extracted firmware images across 42 different device vendors, approximately 43% (846/1,971) of network-reachable firmware are vulnerable to at least one exploit. This was featured on Heise Security and PCWorld.
An analysis of the security of x86 processor microcode, which is used to implement certain processor instructions and correct processor errata. Although all microcode updates on modern microarchitectures appear to be encrypted, this is not necessarily the case for older microarchitectures, such as AMD’s K8 through 12h. In fact, the integrity of updates for these microarchitectures is only protected by a basic checksum, and can be easily modified, resulting in undetermined behavior ranging from an immediate reboot to a system hang. Additionally, malformed microcode updates can be incorrectly cached and trigger invalid paging requests by the microcode update loader in Linux kernel 3.8.13. Accompanying this work, I have released microparse, a small Python tool that can parse and display binary microcode updates, as well as a comprehensive listing of publicly-available microcode updates for AMD and Intel processors.
A remotely-controlled submersible that was deployed to subglacial Lake Whillans as part of the Whillans Ice Stream Subglacial Access Research Drilling (WISSARD) project. It contributed to the discovery of biological life within this lake by recording the first imagery of the lakefloor, and was featured on The New York Times, National Geographic, and Nature News.
Daming D. Chen, Wen Shih Lim, Mohammad Bakhshalipour, Phillip B. Gibbons, James C. Hoe, Bryan Parno. HerQules: Securing Programs via Hardware-Enforced Message Queues. Architectural Support for Programming Languages and Operating Systems (ASPLOS). Detroit, MI. April 2021.
Daming D. Chen, Phillip B. Gibbons, Todd C. Mowry. TardisTM: Incremental Repair for Transactional Memory. Workshop on Programming Models and Applications for Multicores and Manycores (PMAM). San Diego, CA. February 2020.
Daming D. Chen, Manuel Egele, Maverick Woo, David Brumley. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware. Network and Distributed System Security Symposium (NDSS). San Diego, CA. February 2016.
Alberto E. Behar, Daming D. Chen, Colin Ho, Emily McBryan, Christian Walter, Joseph Horen, Scott Foster, Tyler Foster, Andrew Warren, Sai H. Vemprala, James M. Crowell. MSLED: The Micro Subglacial Lake Exploration Device. Underwater Technology 33.1 (July 2015).
Revision: January 2021