I recently submitted my DPhil in Cyber Security at the University of Oxford, where I was funded by the Clarendon Fund, the EPSRC, Kellogg College, and the CDT in Cyber Security. My dissertation, "Leaky Hardware: Modeling and Exploiting Imperfections in Embedded Devices", was supervised by Prof. Kasper Rasmussen.
I spent the first half of 2019 as a "Visiting Assistant in Research (VAR)" at the Computer Architecture and Security Lab of Yale University, where I investigated cloud FPGA covert- and side-channel attacks under Prof. Jakub Szefer.
In 2014, I received an MPhil in Advanced Computer Science with Distinction from the University of Cambridge, where I was the Goulandris Scholar at Magdalene College. Dr. Eiko Yoneki supervised my "Distributed Massive Graph Triangulation" research project.
A year earlier, I graduated Summa Cum Laude from Princeton University, with an AB in Mathematics and a Certificate in Applications of Computing. My thesis, "A Practical Variant of Cuckoo Hashing", was supervised by Prof. Robert Sedgewick.
In 2009, I was the valedictorian of Anatolia College's IB Diploma Programme.
Work and Teaching Experience
I spent the summers of 2017 and 2018 in the FPGA/Hardware group of Jump Trading. I also interned with the Embedded Systems team at Microsoft Research, where I investigated a novel source of information leakage on Xilinx FPGAs under Dr. Ken Eguro. Before starting my PhD, I was an intern in the Product Abuse team at Dropbox, the Windows Security team at Microsoft, and the Data License team at Bloomberg.
During my degree at Princeton, I was a Grader and Lab TA at the computer science department for courses across all undergraduate levels. I have had similar duties in the mathematics and computer science departments at Oxford, including TAing masters-level computer security courses.
I. Giechaskiel, K. B. Rasmussen, and J. Szefer, "C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage," 41st IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, United States of America, May 2020. [Author Copy and Final Version Forthcoming.]
S. Tian, W. Xiong, I. Giechaskiel, K. B. Rasmussen, and J. Szefer, "Fingerprinting Cloud FPGA Infrastructures," 28th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA), Seaside, CA, United States of America, February 2020. [Author Copy and Final Version Forthcoming.]
I. Giechaskiel and K. B. Rasmussen, "Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses," IEEE Communications Surveys & Tutorials (COMST) 2020. [Preprint and Early Access. Final Version Forthcoming.]
I. Giechaskiel, K. B. Rasmussen, and J. Szefer, "Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs," 37th IEEE International Conference on Computer Design (ICCD), Abu Dhabi, United Arab Emirates, November 2019. [Author Copy. Final Version Forthcoming.]
I. Giechaskiel, Y. Zhang, and K. B. Rasmussen, "A Framework for Evaluating Security in the Presence of Signal Injection Attacks," 24th European Symposium on Research in Computer Security (ESORICS), Luxembourg, Luxembourg, September 2019. Best Paper Award. [Author Copy, Extended Technical Report, and Final Version]
I. Giechaskiel, K. B. Rasmussen, and J. Szefer, "Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs," 29th International Conference on Field-Programmable Logic and Applications (FPL), Barcelona, Spain, September 2019. [Author Copy and Final Version]
I. Giechaskiel, K. Eguro, and K. B. Rasmussen, "Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-Channel Attacks," ACM Transactions on Reconfigurable Technology and Systems (TRETS) vol. 12, no. 3, pp. 1-29, August 2019. [Author Copy and Final Version]
I. Giechaskiel, K. B. Rasmussen, and K. Eguro, "Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires," 13th ACM Asia Conference on Computer and Communications Security (ASIACCS), Incheon, South Korea, June 2018. [Author Copy, Earlier Preprints, and Final Version.]
I. Giechaskiel, C. Cremers, and K. B. Rasmussen, "When the "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives," IEEE Security & Privacy, vol. 16, no. 4, pp. 46-56, July/August 2018. [Author Copy and Final Version]
I. Giechaskiel, C. Cremers, and K. B. Rasmussen, "On Bitcoin Security in the Presence of Broken Cryptographic Primitives," 21st European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece, September 2016. [Author Copy, Earlier Preprint, and Final Version.]
I. Giechaskiel, G. Panagopoulos, and E. Yoneki, "PDTL: Parallel and Distributed Triangle Listing for Massive Graphs," 44th International Conference on Parallel Processing (ICPP), Beijing, China, September 2015. [Author Copy, Code, Extended Technical Report, and Final Version]
My name, spelled Ηλίας Γιεχασκιέλ in Greek, is pronounced as ee-LEE-us ye-ha-SKEL.
During my PhD years, I participated in several security Capture-the-Flag (CTF) contests, placing second in Tripwire VERT's 2015 Cyber Security Capture The Flag Contest. I co-founded the Oxford Computer Science CTF Team Ox002147, of which I was captain until 2019. The team was ranked top 100/14,000+ teams globally in 2017, and placed first in in-person CTF competitions organized by Deloitte and BAE Systems. In high school, I competed in Mathematical Olympiads at the Greek National, Balkan (1, 2), and International (1, 2) level.
I occasionally dabble with Android development, having added support for Greek in Hacker's Keyboard, and having published a Tasker plugin allowing messages to be sent over Bluetooth serial. I designed my brother's
prefers-color-scheme media feature.