Personal profile

Hi there 👋

Hi, everyone! I’m Wei Peng, and I graduated from Xi’an University of Posts and Telecommunications (XUPT) in July 2021 with a Bachelor of Engineering in Cybersecurity. Welcome to my personal page.

I currently work at Teenet, where I focus on TEE + Web3. You can also follow Teenet on X/Twitter.

I am enthusiastic about trusted execution environments, confidential computing, software analysis, and attack detection. Building secure systems at the intersection of TEE and Web3 is one of my current research and engineering interests.

Research Interests

  • Trusted Execution Environments (TEE)
  • Confidential Computing
  • TEE + Web3
  • Software Security
  • Software Analysis and Attack Detection

Work Experience

  • Current: Teenet, working on TEE + Web3 infrastructure and secure systems.
  • Previous: Research Assistant, Teecertlab, Southern University of Science and Technology (SUSTech). Worked on confidential computing and security analysis under the supervision of Yinqian Zhang.

Education

  • 2021: B.Eng. in Cybersecurity, Xi’an University of Posts and Telecommunications (XUPT), Xi’an, China.

Publications

Shadows in Cipher Spaces: Exploiting Tweak Repetition in Hardware Memory Encryption

Wei Peng, Yinshuai Li, and Yinqian Zhang.

34th USENIX Security Symposium (USENIX Security ‘25).

We analyze Hygon CSV memory encryption, uncover tweak repetition vulnerabilities, and demonstrate CipherShadow attacks.

PaperProjectCodeArtifactDetails

Ensuring State Continuity for Confidential Computing: A Blockchain-based Approach

Wei Peng, Xiang Li, Jianyu Niu, Xiaokuan Zhang, and Yinqian Zhang.

IEEE Transactions on Dependable and Secure Computing (TDSC), 2024.

An extended journal version of Narrator that explores blockchain-based state continuity for confidential computing.

PaperDetails

Narrator: Secure and Practical State Continuity for Trusted Execution in the Cloud

Jianyu Niu, Wei Peng, Xiaokuan Zhang, and Yinqian Zhang.

Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS ‘22).

Narrator combines blockchain and TEEs to provide secure and practical state continuity for cloud confidential computing.

PaperDetails

Honors and Awards

  • (2023/11)(WorkShop) IDASH PRIVACY & SECURITY WORKSHOP 2023 - Track 3, the first place