Khilan Gudka
I am a Security Software Engineer at Hudson River Trading.
Previously, I was a Security Software Engineer at G-Research.
Before moving into industry, I spent seven years in academia as a Research Associate (postdoc) in the Security Group at the University of Cambridge Computer Laboratory supervised by Dr. Robert N. M. Watson. During this time, I led work on the SOAAP project, which explored semi-automated techniques, grounded in static analysis, dynamic analysis, and program transformation, to improve the developer experience when compartmentalising applications. Moreover, it aimed to provide better understanding of the security, performance and complexity tradeoffs of different compartmentalisation strategies. I also led work investigating the use of CHERI to protect C++ applications, such as web browsers.
Prior to my postdoc, I completed a PhD at the Department of Computing, Imperial College London supervised by Professor Susan Eisenbach and Professor Sophia Drossopoulou. My thesis explored the technique of lock inference for implementing atomic sections. This technique infers a set of locks for each atomic section, while attempting to balance the requirements of maximal concurrency, minimal locking overhead and freedom from deadlock. I focused on lock-inference techniques for tackling large Java programs making use of mature libraries. My research was generously funded by Microsoft Research Cambridge as part of their PhD Scholarship programme. My mentor at Microsoft was Dr. Tim Harris.
Email: [firstname]@khilan.com
Profiles: Google Scholar, LinkedIn
Research interests
Security, Program Analysis, Compilers, Concurrency
Publications
- Cornucopia: Temporal Safety for CHERI Heaps
Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, and Robert N. M. Watson
IEEE Symposium on Security and Privacy (IEEE S&P 2020), May 2020 - CHERI Concentrate: Practical Compressed Capabilities
Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony Fox, Robert Norton, Thomas Bauereiss, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel W. Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore
IEEE Transactions on Computers 2019, October 2019 - CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment
Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, James Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey Son, and Jonathan Woodruff.
ASPLOS 2019, April 2019 - CheriRTOS: A Capability Model for Embedded Devices
Hongyan Xia, Jonathan Woodruff, Hadrien Barral, Lawrence Esswood, Alexandre Joannou, Robert Kovacsics, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alex Richardson, Simon W. Moore, and Robert N. M. Watson.
ICCD 2018, October 2018 -
Efficient Tagged Memory
Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon. W. Moore, Alex Bradbury, Hongyan Xia, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson, Stacey Son and A. Theodore Markettos.
ICCD 2017, November 2017 -
CHERI JNI: Sinking the Java security model into the C
David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannouand, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert Norton, Stacey Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, and Robert N. M. Watson
ASPLOS 2017, April 2017 -
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture
Robert N. M. Watson, Robert M. Norton, Jon Woodruff, Simon W. Moore, Peter G. Neumann, Jon Anderson, David Chisnall, Brooks Davis, Ben. Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, J. Edward Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son and Munraj Vadera. Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.
IEEE Micro 36, 5 (2016), 38–49. -
Clean Application Compartmentalization with SOAAP (Slides)
Khilan Gudka, Robert N. M. Watson, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Ilias Marinos, Peter G. Neumann, and Alex Richardson
ACM CCS 2015, October 2015 -
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization
Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert Norton, Michael Roe, Stacey Son, and Munraj Vadera
IEEE Symposium on Security and Privacy (IEEE S&P 2015), May 2015 -
TESLA: Temporally Enhanced System Logic Assertions
Jonathan Anderson, Robert N. M. Watson, David Chisnall, Khilan Gudka, Brooks Davis, Ilias Marinos
EuroSys 2014, April 2014 -
Towards a Theory of Application Compartmentalisation
Robert N. M. Watson, Steven J. Murdoch, Khilan Gudka, Jonathan Anderson, Peter G. Neumann, Ben Laurie
Security Protocols Workshop, March 2013 -
Lock Inference for Java (Slides)
Khilan Gudka
PhD Thesis, Imperial College London, December 2012
(Nominated for the BCS Distinguished Dissertation award) -
Exploring Compartmentalisation Hypotheses with SOAAP (Slides)
Khilan Gudka, Robert N. M. Watson, Steven Hand, Ben Laurie, Anil Madhavapeddy
Workshop on Adaptive Host and Network Security (AHANS 2012), September 2012 -
Lock Inference in the Presence of Large Libraries (Slides)
Khilan Gudka, Tim Harris, Susan Eisenbach
ECOOP 2012, June 2012 -
Fast Multi-Level Locks for Java: A Preliminary Performance Evaluation (Slides)
Khilan Gudka, Susan Eisenbach
EC2 2010: Workshop on Exploiting Concurrency Efficiently and Correctly, July 2010 -
Keep Off The Grass: Locking the Right Path for Atomicity (Slides)
David Cunningham, Khilan Gudka, Susan Eisenbach
Compiler Construction 2008, October 2008
Talks
-
Protecting C++ programs with CHERI
Khilan Gudka, Alexander Richardson, Robert N. M. Watson
Principles of Secure Compilation (PriSC 2019), January 2019
Posters
-
Improving the Performance of Atomic Sections
Microsoft Research Cambridge Summer School 2009
Reports
-
Improving the Performance of Atomic Sections (Slides)
PhD Transfer Report, September 2009 -
Implementing Atomic Sections Using Lock Inference (Outsourcing) (Distinguished Project)
MEng Final Year Project, June 2007