Dr. Ilias Giechaskiel
I was recently awarded a DPhil in Cyber Security for my thesis, Leaky Hardware: Modeling and Exploiting Imperfections in Embedded Devices, from the University of Oxford, where I was funded by the Clarendon Fund, the EPSRC, Kellogg College, and the CDT in Cyber Security. I spent the first half of 2019 as a “Visiting Assistant in Research (VAR)” at the Computer Architecture and Security Lab of Yale University, with which I still collaborate as a Research Affiliate. In 2014, I received an MPhil in Advanced Computer Science with Distinction from the University of Cambridge, where I was the Goulandris Scholar at Magdalene College. A year earlier, I graduated Summa Cum Laude from Princeton University, with an AB in Mathematics and a Certificate in Applications of Computing. In 2009, I was the valedictorian of Anatolia College's IB Diploma Programme.
Work and Teaching Experience
I am currently a Hardware Research Engineer at Jump Trading, where I also spent the summers of 2017 and 2018. Earlier, I interned with the Embedded Systems team at Microsoft Research, the Product Abuse team at Dropbox, the Windows Security team at Microsoft, and the Data License team at Bloomberg. During my degree at Princeton, I was a Grader and Lab Teaching Assistant (TA) at the computer science department for courses across all undergraduate levels. I have had similar duties in the mathematics and computer science departments at Oxford, including being the TA for masters-level computer security courses.
S. Tian, A. Krzywosz, I. Giechaskiel, and J. Szefer, “Cloud FPGA Security with RO-Based Primitives,” 19th International Conference on Field-Programmable Technology (FPT), Maui, HI, United States of America, December 2020. [(Author Copy and Final Version Forthcoming).]
I. Giechaskiel and J. Szefer, “Information Leakage from FPGA Routing and Logic Elements,” 39th IEEE/ACM International Conference on Computer-Aided Design (ICCAD), San Diego, CA, United States of America, November 2020. [Author Copy and (Final Version Forthcoming).]
I. Giechaskiel, K. B. Rasmussen, and J. Szefer, ”C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage,“ 41st IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, United States of America, May 2020. [Author Copy, Talk Preview, and Final Version.]
S. Tian, W. Xiong, I. Giechaskiel, K. B. Rasmussen, and J. Szefer, “Fingerprinting Cloud FPGA Infrastructures,” 28th ACM/SIGDA International Symposium on Field-Programmable Gate Arrays (FPGA), Seaside, CA, United States of America, February 2020. [Author Copy, Code, and Final Version.]
I. Giechaskiel and K. B. Rasmussen, “Taxonomy and Challenges of Out-of-Band Signal Injection Attacks and Defenses,” IEEE Communications Surveys & Tutorials (COMST), vol. 22, no. 1, pp. 645—670, March 2020. [Author Copy, Earlier Preprints, and Final Version.]
I. Giechaskiel, K. B. Rasmussen, and J. Szefer, “Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs,” 37th IEEE International Conference on Computer Design (ICCD), Abu Dhabi, United Arab Emirates, November 2019. [Author Copy, Code, and Final Version.]
I. Giechaskiel, Y. Zhang, and K. B. Rasmussen, “A Framework for Evaluating Security in the Presence of Signal Injection Attacks,” 24th European Symposium on Research in Computer Security (ESORICS), Luxembourg, Luxembourg, September 2019. Best Paper Award. [Author Copy, Extended Technical Report, and Final Version.]
I. Giechaskiel, K. B. Rasmussen, and J. Szefer, “Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs,” 29th International Conference on Field-Programmable Logic and Applications (FPL), Barcelona, Spain, September 2019. [Author Copy and Final Version.]
I. Giechaskiel, K. Eguro, and K. B. Rasmussen, “Leakier Wires: Exploiting FPGA Long Wires for Covert- and Side-Channel Attacks,” ACM Transactions on Reconfigurable Technology and Systems (TRETS), vol. 12, no. 3, pp. 1—29, September 2019. [Author Copy and Final Version.]
I. Giechaskiel, K. B. Rasmussen, and K. Eguro, “Leaky Wires: Information Leakage and Covert Communication Between FPGA Long Wires,” 13th ACM Asia Conference on Computer and Communications Security (ASIACCS), Incheon, South Korea, June 2018. [Author Copy, Earlier Preprints, and Final Version.]
I. Giechaskiel, C. Cremers, and K. B. Rasmussen, “When the "Crypto" in Cryptocurrencies Breaks: Bitcoin Security Under Broken Primitives,” IEEE Security & Privacy, vol. 16, no. 4, pp. 46-56, July/August 2018. [Author Copy and Final Version.]
I. Giechaskiel, C. Cremers, and K. B. Rasmussen, “On Bitcoin Security in the Presence of Broken Cryptographic Primitives,” 21st European Symposium on Research in Computer Security (ESORICS), Heraklion, Greece, September 2016. [Author Copy, Earlier Preprint, and Final Version.]
I. Giechaskiel, G. Panagopoulos, and E. Yoneki, “PDTL: Parallel and Distributed Triangle Listing for Massive Graphs,” 44th International Conference on Parallel Processing (ICPP), Beijing, China, September 2015. [Author Copy, Code, Extended Technical Report, and Final Version.]
During my PhD years, I participated in several security Capture-the-Flag (CTF) contests, placing second in Tripwire VERT's 2015 Cyber Security Capture The Flag Contest. I co-founded the Oxford Computer Science CTF Team Ox002147, of which I was captain until 2019. The team was ranked top 100/14,000+ teams globally in 2017, and placed first in in-person CTF competitions organized by Deloitte and BAE Systems. In high school, I competed in Mathematical Olympiads at the Greek National, Balkan (1, 2), and International (1, 2) level.
I occasionally dabble with Android development, having added support for Greek in Hacker's Keyboard, and having published a Tasker plugin allowing messages to be sent over Bluetooth serial. I also recently became a licensed amateur radio operator in the UK as M7ILI.
I designed my brother's
prefers-color-scheme media feature.