I am a senior researcher at Azure Research in Cambridge. Most of my work is dedicated to finding and fixing information leaks in secure systems, with the primary focus on microarchitectural (side-channel) leaks like Spectre and Meltdown. Beyond that, I am interested in all topics related to fuzzing, trusted execution environments, memory safety, and secure hardware architectures.
[13] | Hofmann, J., Vannacci, E., Fournet, C., Köpf, B., Oleksenko, O. Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions. In USENIX Security Symposium (USENIX Security). (2023). [ Web | PDF | GitHub | Artifact ] |
[12] | Oleksenko, O., Guarnieri, M., Köpf, B., and Silberstein, M. Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing. In IEEE Symposium on Security and Privacy (S&P) (2023). [ Web | PDF | GitHub ] |
[11] | [Micro Top Pick'23] Oleksenko, O., Fetzer, C., Köpf, B., and Silberstein, M. Revizor: Testing Black-box CPUs against Speculation Contracts. In Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2022). [ Web | Report | GitHub ] |
[10] | Trach B., Faqeh R., Oleksenko O., Ozga W., Bhatotia P., Fetzer C. T-lease: A trusted lease primitive for distributed systems. In ACM Symposium on Cloud Computing (2020). [ Web ] |
[9] | [First Place @ CSAW'20] Oleksenko, O., Trach, B., Silberstein, M., and Fetzer, C. SpecFuzz: Bringing Spectre-type vulnerabilities to the surface. In USENIX Security Symposium (2020). [ Web | Report ] |
[8] | Trach, B., Oleksenko, O., Gregor, F., Bhatotia, P., and Fetzer, C. Clemmys: Towards Secure Remote Execution in FaaS. ACM/USENIX SYSTOR (2019). [ DOI | Slides ] |
[7] | Oleksenko, O., Trach, B., Reiher, T., Silberstein, M., and Fetzer, C. You Shall Not Bypass: Employing data dependencies to prevent Bounds Check Bypass. arXiv preprint (2018). [ Report ] |
[6] | Oleksenko, O., Trach, B., Krahn, R., Martin, A., Silberstein, M., and Fetzer, C. Varys: Protecting SGX enclaves from practical side-channel attacks. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC) (2018). [ Web | PDF | Slides ] |
[5] | Oleksenko, O., Kuvaiskii, D., Bhatotia, P., Felber, P., and Fetzer, C. Intel MPX Explained: A Cross-layer Analysis of the Intel MPX System Stack. In Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (SIGMETRICS), (2018). [ DOI | Web | Report | GitHub ] |
[4] | Oleksenko, O., Kuvaiskii, D., Bhatotia, P., and Fetzer, C. Fex: A Software Systems Evaluator. In Proceedings of the 47st International Conference on Dependable Systems & Networks (DSN) (2017). [ PDF | GitHub ] |
[3] | [Best Paper Award] Kuvaiskii, D., Oleksenko, O., Arnautov, S., Trach, B., Bhatotia, P., Felber, P., and Fetzer, C. SGXBounds: Memory safety for shielded execution. In Proceedings of the Twelfth European Conference on Computer Systems (EuroSys) (2017). [ PDF | GitHub ] |
[2] | Kuvaiskii, D., Oleksenko, O., Bhatotia, P., Felber, P., and Fetzer, C. Elzar: Triple Modular Redundancy using Intel AVX (Practical Experience Report). In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2016). [ PDF | Report ] |
[1] | Oleksenko, O. SIMD-Swift: Improving Performance of Swift Fault Detection, 2015. [ PDF ] |