Avatar

YQ

Alt Research

Biography

I'm the founder of Alt Research, building an elastic and versatile scaling protocol AltLayer for Web3. Before 2022, I was the director of Parity Asia and selected to the Forbes 30 Under 30 Asia list, 2019.

Prior to that, I was the CTO of Zilliqa. I led the efforts of designing and building the very first public blockchain platform with full-fledged sharding features including network/transaction/smart contract sharding. Meanwhile, I drived the collaboration with Xfers on the stablecoin initiative for Southeast Asia StraitsX. I also participated in blockchain projects with Mindshare, Singapore Exchange, Hg Exchange, etc.

Before 2018, I was a Research Fellow at the National University of Singapore. I got my Ph.D. in School of Computing at NUS in 2017.

My research interests span the areas of blockchain security, distributed system security, web security/privacy, and network security. I have proposed solutions to secure the web infrastructure from two perspectives – networking and system, e.g., addressing privacy / consensus issues in web overlays and identifying new attacks/vulnerabilities in web browsers.

My research work has been published in CCS, USENIX Security, PETS, RAID, ESORICS etc. I have received the Best Paper Award in W2SP (2014) and ICECCS (2014). My work got acknowledged by various vendors including Google and Apple (CVE-2014-7948 for Chrome and CVE-2015-5907 for Safari), as well as received attention from the media including Dailydot, Gizmodo and Techspot.

Interests

  • Blockchain Security
  • Distributed System Security
  • Network Security
  • Web Security/Privacy

Education

  • PhD in Computer Security, 2017

    National University of Singapore

Accomplish­ments

Forbes 30 Under 30

Dean's Graduate Research Excellence Award

Best Paper Award

Best Paper Award

Google Excellence Scholarship

Recent Publications

Quickly discover relevant content by filtering publications.

Robust Synchronous P2P Primitives Using SGX Enclaves

Peer-to-peer (P2P) systems such as BitTorrent and Bitcoin are susceptible to serious attacks from byzantine nodes that join as peers. …

The “Web/Local” Boundary Is Fuzzy: A Security Study of Chrome’s Process-based Sandboxing

Process-based isolation, suggested by several research prototypes, is a cornerstone of modern browser security architectures. Google …

PRO-ORAM: Constant Latency Read-Only Oblivious RAM

Oblivious RAM is a well-known cryptographic primitive to hide data access patterns. However, the best known ORAM schemes require a …

OblivP2P: An Oblivious Peer-to-Peer Content Sharing System

Peer-to-peer (P2P) systems are predominantly used to distribute trust, increase availability and improve performance. A number of …

Web-to-Application Injection Attacks on Android: Characterization and Detection

Vulnerable Android applications are traditionally exploited via malicious apps. In this paper, we study an underexplored class of …

Services

 
 
 
 
 

Professional Services

Aug 2012 – Present
  • Reviewer: IEEE Transactions on Information Forensics and Security (TIFS), AsiaCCS 2019, SDLT 18, 19
  • Student PC: S&P’ 17
  • External Reviewer: S&P'15, 16; CCS'15, 16; Usenix Security'15; NDSS'15 - 17; WWW'15; AsiaCCS'14, 15; ICDCS'16, 17