Publications
SCALE: Tackling Communication Bottlenecks in Confidential Multi-GPU ML
Joongun Park, Yongqin Wang, Huan Xu, Hanjiang Wu, Mengyuan Li, Tushar Krishna
IEEE International Symposium on High-Performance Computer Architecture (HPCA) 2026
WAVE: Leveraging Architecture Observation for Privacy-Preserving Model Oversight
Haoxuan Xu*, Chen Gong*, Beijie Liu*, Haizhong Zheng, Beidi Chen, Mengyuan Li (*equal contribution)
ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS) 2026
Few-Shot Graph Out-of-Distribution Detection with LLMs
Haoyan Xu, Zhengtao Yao, Yushun Dong, Ziyi Wang, Ryan Rossi, Mengyuan Li, Yue Zhao
Joint European Conference on Machine Learning and Knowledge Discovery in Databases (ECML-PKDD) 2025
Chekhov's Gun: Uncovering Hidden Risks in macOS Application-Sandboxed PID-Domain Services
Minghao Lin, Jiaxun Zhu, Tingting Yin, Zechao Cai, Guanxing Wen, Yanan Guo, Mengyuan Li
ACM Conference on Computer and Communications Security (CCS) 2025
A Close Look at RMP Entry Caching and Its Security Implications in SEV-SNP
Alexis Bagia, Vincent Quentin Ulitzsch, Daniël Trujillo, Mengyuan Li, Mengjia Yan, Jean-Pierre Seifert
14th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP) 2025
Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling
Shixuan Zhao*, Mengyuan Li*, Mengjia Yan, Zhiqiang Lin (*equal contribution)
Under Submission
Bridge the Future: High-Performance Networks in Confidential VMs without Trusted I/O devices
Mengyuan Li, Shashvat Srivastava, Mengjia Yan
Under Submission
SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments
Mengyuan Li, Yuheng Yang, Guoxing Chen, Mengjia Yan, Yinqian Zhang
ACM ASIACCS'24
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations
Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang, Shoumeng Yan, Yinqian Zhang
USENIX Security Symposium'23
PWRLEAK: Exploiting Power Reporting Interface for Side-channel Attacks on AMD SEV
Wubing Wang, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
20th Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA 2023)
A Systematic Look at Ciphertext Side Channels
Mengyuan Li*, Luca Wilke*, Jan Wichelmann, Thomas Eisenbarth, Radu Teodorescu, Yinqian Zhang (*equal contribution)
IEEE Symposium on Security and Privacy'22 (Acceptance rate: 57/407=14.0%)
vSGX: Virtualizing SGX Enclaves on AMD SEV
Shixuan Zhao, Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
IEEE Symposium on Security and Privacy'22 (Acceptance rate: 54/327=15.2%)
TLB Poisoning Attacks on AMD Secure Encrypted Virtualization
Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Chen
The 2021 Annual Computer Security Applications Conference (ACSAC 2021) (Acceptance rate: 56/326=15.2%)
CROSSLINE: Breaking "Security-by-Crash" based Memory Isolation in AMD SEV
Mengyuan Li, Yinqian Zhang, Zhiqiang Lin
ACM Conference on Computer and Communications Security'21, Nov. 2021 (Acceptance rate: 196/879=22.3%)
CIPHERLEAKS: Breaking Constant-time Cryptography on AMD SEV via the Ciphertext Side Channel
Mengyuan Li, Yinqian Zhang, Huibo Wang, Kang Li, Yueqiang Chen
USENIX Security Symposium'21, Virtual, Aug. 2021 (Acceptance rate: 248/1319=18.8%)
AMD filed an embargo for the ciphertext side channel identified in the paper and announced a security
bulletin together with a hardware patch for SEV-SNP in August 2021
[CVE-2020-12966]
Defeating speculative-execution attacks on SGX with HyperRace
Guoxing Chen, Mengyuan Li, Fengwei Zhang, Yinqian Zhang
IEEE Conference on Dependable and Secure Computing'19, Hangzhou, China, Nov. 2021
Exploiting Unprotected I/O Operations in AMD's Secure Encrypted Virtualization
Mengyuan Li, Yinqian Zhang, Zhiqiang Lin, Yan Solihin
USENIX Security Symposium'19, Santa Clara, CA, Aug. 2019 (Acceptance rate: 113/697=16.2%)
Peeking Behind the Curtains of Serverless Platforms
Liang Wang, Mengyuan Li, Yinqian Zhang, Thomas Ristenpart, Michael Swift
USENIX ATC'18, Boston, MA, USA, July. 2018 (Acceptance rate: 76/378=20.1%)
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Yuan Xiao, Mengyuan Li, Sanchuan Chen, Yinqian Zhang
ACM Conference on Computer and Communications Security'17, Dallas, TX, USA, Oct. 2017 (Acceptance rate: 151/843=17.9%)
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals
Mengyuan Li, Yan Meng, Junyi Liu, Haojin Zhu, Xiaohui Liang, Yao Liu, Na Ruan
ACM Conference on Computer and Communications Security'16, Vienna, Austria, Oct. 2016 (Acceptance rate: 137/831=16.5%)