Personal profile
Hi there 👋
Hi, everyone! I’m Wei Peng, and I graduated from Xi’an University of Posts and Telecommunications (XUPT) in July 2021 with a Bachelor of Engineering in Cybersecurity. Welcome to my personal page.
I currently work at Teenet, where I focus on TEE + Web3. You can also follow Teenet on X/Twitter.
I am enthusiastic about trusted execution environments, confidential computing, software analysis, and attack detection. Building secure systems at the intersection of TEE and Web3 is one of my current research and engineering interests.
Research Interests
- Trusted Execution Environments (TEE)
- Confidential Computing
- TEE + Web3
- Software Security
- Software Analysis and Attack Detection
Work Experience
- Current: Teenet, working on TEE + Web3 infrastructure and secure systems.
- Previous: Research Assistant, Teecertlab, Southern University of Science and Technology (SUSTech). Worked on confidential computing and security analysis under the supervision of Yinqian Zhang.
Education
- 2021: B.Eng. in Cybersecurity, Xi’an University of Posts and Telecommunications (XUPT), Xi’an, China.
Publications
Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption
Wei Peng, Yinshuai Li, and Yinqian Zhang.
34th USENIX Security Symposium (USENIX Security ‘25).
We analyze Hygon CSV memory encryption, uncover tweak repetition vulnerabilities, and demonstrate CipherShadow attacks.
| Paper | Project | Code | Artifact | Details |
Ensuring State Continuity for Confidential Computing: A Blockchain-based Approach
Wei Peng, Xiang Li, Jianyu Niu, Xiaokuan Zhang, and Yinqian Zhang.
IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.
An extended journal version of Narrator that explores blockchain-based state continuity for confidential computing.
| Paper | Details |
Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud
Jianyu Niu, Wei Peng, Xiaokuan Zhang, and Yinqian Zhang.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘22).
Narrator combines blockchain and TEEs to provide secure and practical state continuity for cloud confidential computing.
| Paper | Details |
Honors and Awards
- (2023/11)(WorkShop) IDASH PRIVACY & SECURITY WORKSHOP 2023 - Track 3, the first place
