Silei Ren
Ph.D. Candidate
I am a Ph.D. candidate at Cornell University, advised by professor Andrew C. Myers. My research began with a broad focus on security, but over the years, I have become convinced that language-based security is the best approach. My current work sits at the intersection of programming languages, compilers, and security.
I am graduating in August 2026 and I am looking for industry opportunities!
Education
Ph.D. in Computer Science Cornell University / Ithaca, NY, USA
Sc.B. in Computer Science & Mathematics Brown University / Providence, RI, USA
Research
Security Type Confusion
Abstract
Type systems are a lightweight way to obtain assurance that code enjoys useful properties, including security properties. But in decentralized settings such as smart contracts and federated distributed systems, malicious adversaries may not obey the type system. They may attempt to confuse trusted code by supplying values that do not behave as their advertised type claims. We show that well-known attacks such as Confused Deputy Attacks (CDAs) and reentrancy attacks can be understood as instances of this kind of type confusion. In this paper, we show how to obtain the guarantees of a type system despite the presence of malicious type confusion, using a novel mechanism that combines static and dynamic information flow checking. We give an information-flow-typed core calculus with a run-time enforcement mechanism, and formally prove the security of this mechanism as a hyperproperty-preserving simulation between ill-typed and well-typed programs. With this mechanism, programmers can write code while pretending that adversaries are constrained to obey the type system. The security properties enforced by this ideal system continue to hold in the real system where adversaries lie about types.
Silei Ren, Suraaj Kanniwadi, Hanxi Chen, Andrew C. Myers; In Submission
DeadDrop: Responsible Disclosure of Smart Contract Bug
Abstract
Modern software security increasingly relies on bug bounty programs, which incentivize independent researchers to discover and responsibly disclose vulnerabilities. While effective in traditional software ecosystems, these programs face unique challenges in the context of smart contracts. Smart contracts run on blockchains, manage financial assets, and are typically authored by pseudonymous developers. As a result, when vulnerabilities are discovered, security researchers often lack a secure and reliable channel for disclosure. Existing workarounds, such as encrypting messages to contract authors’ public keys, introduce inefficiencies and privacy risks, since ciphertexts themselves may reveal the presence of bugs. We propose DeadDrop, the first system to support oblivious bug reporting for smart contracts. DeadDrop combines oblivious message retrieval (OMR) with a trusted execution environment (TEE) to enable researchers to privately and efficiently deliver vulnerability reports without revealing their intended recipient or overwhelming authors with spam. Our design specifies security requirements for such a system, presents practical techniques for handling long messages, and introduces a bug specification language to formalize submissions. We implement a prototype and evaluate its performance, demonstrating that oblivious bug reporting is both feasible and efficient, achieving an amortized processing time of approximately 3 ms per submission. Finally, we discuss incentive mechanisms to encourage participation, highlighting open challenges for decentralized bug bounty ecosystems.
Mariarosaria Barbaraci, Stephanie Ma, Harjasleen Malvai, Marwa Mouallem, Silei Ren, Yoshi Sato, Sen Yang, Fan Zhang (authors in alphabetical order); In Submission
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference
Abstract
Language-based information flow control (IFC) enables reasoning about and enforcing security policies in decentralized applications. While information flow properties are relatively extensional and compositional, designing expressive systems that enforce such properties remains challenging. In particular, it can be difficult to use IFC labels to model certain security assumptions, such as semi-honest agents. Motivated by these modeling limitations, we study the algebraic semantics of lattice-based IFC label models, and propose a semantic framework that allows formalizing asymmetric delegation, which is partial delegation of confidentiality or integrity. Our framework supports downgrading of information and ensures their safety through nonmalleable information flow (NMIF). To demonstrate the practicality of our framework, we design and implement a novel algorithm that statically checks NMIF and a label inference procedure that efficiently supports bounded label polymorphism, allowing users to write code generic with respect to labels.
Silei Ren, Coşku Acay, Andrew C. Myers; ESORICS 2025
The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures
Abstract
The concept of learned index structures relies on the idea that the input-output functionality of a database index can be viewed as a prediction task and, thus, implemented using a machine learning model instead of traditional algorithmic techniques. This novel angle for a decades-old problem has inspired exciting results at the intersection of machine learning and data structures. However, the advantage of learned index structures, i.e., the ability to adjust to the data at hand via the underlying ML-model, can become a disadvantage from a security perspective as it could be exploited. In this work, we present the! rst study of data poisoning attacks on learned index structures. Our poisoning approach is di"erent from all previous works since the model under attack is trained on a cumulative distribution function (CDF) and, thus, every injection on the training set has a cascading impact on multiple data values. We formulate the! rst poisoning attacks on linear regression models trained on a CDF, which is a basic building block of the proposed learned index structures. We generalize our poisoning techniques to attack the advanced two-stage design of learned index structures called recursive model index (RMI), which has been shown to outperform traditional B-Trees. We evaluate our attacks under a variety of parameterizations of the model and show that the error of the RMI increases up to 300X and the error of its second-stagemodels increases up to 3000X.
Evgenios M Kornaropoulos, Silei Ren, Roberto Tamassia; SIGMOD 2022
Project
Viaduct
Viaduct is an extensible, optimizing compiler that automatically employs cryptography to enforce high-level security specifications.
Talk/Presentation
Trust Delegation in Information Flow Control Systems UC Berkeley Programming Systems Seminar / Berkeley, CA, USA
Original research presented at UC Berkeley Programming Systems Seminar.Universal Composability is Robust Compilation Cornell PLDG Seminar / Ithaca, NY, USA
Reading group presentation on the work of M. Patrignani, et al.A Quantale of Information Cornell PLDG Seminar / Ithaca, NY, USA
Reading group presentation on the work of S. Hunt, et al.Teaching
Security Type Confusion
Abstract
Type systems are a lightweight way to obtain assurance that code enjoys useful properties, including security properties. But in decentralized settings such as smart contracts and federated distributed systems, malicious adversaries may not obey the type system. They may attempt to confuse trusted code by supplying values that do not behave as their advertised type claims. We show that well-known attacks such as Confused Deputy Attacks (CDAs) and reentrancy attacks can be understood as instances of this kind of type confusion. In this paper, we show how to obtain the guarantees of a type system despite the presence of malicious type confusion, using a novel mechanism that combines static and dynamic information flow checking. We give an information-flow-typed core calculus with a run-time enforcement mechanism, and formally prove the security of this mechanism as a hyperproperty-preserving simulation between ill-typed and well-typed programs. With this mechanism, programmers can write code while pretending that adversaries are constrained to obey the type system. The security properties enforced by this ideal system continue to hold in the real system where adversaries lie about types.
Silei Ren, Suraaj Kanniwadi, Hanxi Chen, Andrew C. Myers; In Submission
DeadDrop: Responsible Disclosure of Smart Contract Bug
Abstract
Modern software security increasingly relies on bug bounty programs, which incentivize independent researchers to discover and responsibly disclose vulnerabilities. While effective in traditional software ecosystems, these programs face unique challenges in the context of smart contracts. Smart contracts run on blockchains, manage financial assets, and are typically authored by pseudonymous developers. As a result, when vulnerabilities are discovered, security researchers often lack a secure and reliable channel for disclosure. Existing workarounds, such as encrypting messages to contract authors’ public keys, introduce inefficiencies and privacy risks, since ciphertexts themselves may reveal the presence of bugs. We propose DeadDrop, the first system to support oblivious bug reporting for smart contracts. DeadDrop combines oblivious message retrieval (OMR) with a trusted execution environment (TEE) to enable researchers to privately and efficiently deliver vulnerability reports without revealing their intended recipient or overwhelming authors with spam. Our design specifies security requirements for such a system, presents practical techniques for handling long messages, and introduces a bug specification language to formalize submissions. We implement a prototype and evaluate its performance, demonstrating that oblivious bug reporting is both feasible and efficient, achieving an amortized processing time of approximately 3 ms per submission. Finally, we discuss incentive mechanisms to encourage participation, highlighting open challenges for decentralized bug bounty ecosystems.
Mariarosaria Barbaraci, Stephanie Ma, Harjasleen Malvai, Marwa Mouallem, Silei Ren, Yoshi Sato, Sen Yang, Fan Zhang (authors in alphabetical order); In Submission
An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference
Abstract
Language-based information flow control (IFC) enables reasoning about and enforcing security policies in decentralized applications. While information flow properties are relatively extensional and compositional, designing expressive systems that enforce such properties remains challenging. In particular, it can be difficult to use IFC labels to model certain security assumptions, such as semi-honest agents. Motivated by these modeling limitations, we study the algebraic semantics of lattice-based IFC label models, and propose a semantic framework that allows formalizing asymmetric delegation, which is partial delegation of confidentiality or integrity. Our framework supports downgrading of information and ensures their safety through nonmalleable information flow (NMIF). To demonstrate the practicality of our framework, we design and implement a novel algorithm that statically checks NMIF and a label inference procedure that efficiently supports bounded label polymorphism, allowing users to write code generic with respect to labels.
Silei Ren, Coşku Acay, Andrew C. Myers; ESORICS 2025
The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures
Abstract
The concept of learned index structures relies on the idea that the input-output functionality of a database index can be viewed as a prediction task and, thus, implemented using a machine learning model instead of traditional algorithmic techniques. This novel angle for a decades-old problem has inspired exciting results at the intersection of machine learning and data structures. However, the advantage of learned index structures, i.e., the ability to adjust to the data at hand via the underlying ML-model, can become a disadvantage from a security perspective as it could be exploited. In this work, we present the! rst study of data poisoning attacks on learned index structures. Our poisoning approach is di"erent from all previous works since the model under attack is trained on a cumulative distribution function (CDF) and, thus, every injection on the training set has a cascading impact on multiple data values. We formulate the! rst poisoning attacks on linear regression models trained on a CDF, which is a basic building block of the proposed learned index structures. We generalize our poisoning techniques to attack the advanced two-stage design of learned index structures called recursive model index (RMI), which has been shown to outperform traditional B-Trees. We evaluate our attacks under a variety of parameterizations of the model and show that the error of the RMI increases up to 300X and the error of its second-stagemodels increases up to 3000X.
Evgenios M Kornaropoulos, Silei Ren, Roberto Tamassia; SIGMOD 2022