profile avatar

Silei Ren

Ph.D. Candidate

I am a Ph.D. candidate at Cornell University, advised by professor Andrew C. Myers. My research began with a broad focus on security, but over the years, I have become convinced that language-based security is the best approach. My current work sits at the intersection of programming languages, compilers, and security.

I am graduating in August 2026 and I am looking for industry opportunities!

Education

Feb 2020 - Present

Ph.D. in Computer Science   Cornell University / Ithaca, NY, USA

Oct 2015 - Jun 2019

Sc.B. in Computer Science & Mathematics   Brown University / Providence, RI, USA

Research

Security Type Confusion

Abstract

Type systems are a lightweight way to obtain assurance that code enjoys useful properties, including security properties. But in decentralized settings such as smart contracts and federated distributed systems, malicious adversaries may not obey the type system. They may attempt to confuse trusted code by supplying values that do not behave as their advertised type claims. We show that well-known attacks such as Confused Deputy Attacks (CDAs) and reentrancy attacks can be understood as instances of this kind of type confusion. In this paper, we show how to obtain the guarantees of a type system despite the presence of malicious type confusion, using a novel mechanism that combines static and dynamic information flow checking. We give an information-flow-typed core calculus with a run-time enforcement mechanism, and formally prove the security of this mechanism as a hyperproperty-preserving simulation between ill-typed and well-typed programs. With this mechanism, programmers can write code while pretending that adversaries are constrained to obey the type system. The security properties enforced by this ideal system continue to hold in the real system where adversaries lie about types.

Silei Ren, Suraaj Kanniwadi, Hanxi Chen, Andrew C. Myers; In Submission

DeadDrop: Responsible Disclosure of Smart Contract Bug

Abstract

Modern software security increasingly relies on bug bounty programs, which incentivize independent researchers to discover and responsibly disclose vulnerabilities. While effective in traditional software ecosystems, these programs face unique challenges in the context of smart contracts. Smart contracts run on blockchains, manage financial assets, and are typically authored by pseudonymous developers. As a result, when vulnerabilities are discovered, security researchers often lack a secure and reliable channel for disclosure. Existing workarounds, such as encrypting messages to contract authors’ public keys, introduce inefficiencies and privacy risks, since ciphertexts themselves may reveal the presence of bugs. We propose DeadDrop, the first system to support oblivious bug reporting for smart contracts. DeadDrop combines oblivious message retrieval (OMR) with a trusted execution environment (TEE) to enable researchers to privately and efficiently deliver vulnerability reports without revealing their intended recipient or overwhelming authors with spam. Our design specifies security requirements for such a system, presents practical techniques for handling long messages, and introduces a bug specification language to formalize submissions. We implement a prototype and evaluate its performance, demonstrating that oblivious bug reporting is both feasible and efficient, achieving an amortized processing time of approximately 3 ms per submission. Finally, we discuss incentive mechanisms to encourage participation, highlighting open challenges for decentralized bug bounty ecosystems.

Mariarosaria Barbaraci, Stephanie Ma, Harjasleen Malvai, Marwa Mouallem, Silei Ren, Yoshi Sato, Sen Yang, Fan Zhang (authors in alphabetical order); In Submission

An Algebraic Approach to Asymmetric Delegation and Polymorphic Label Inference

Abstract

Language-based information flow control (IFC) enables reasoning about and enforcing security policies in decentralized applications. While information flow properties are relatively extensional and compositional, designing expressive systems that enforce such properties remains challenging. In particular, it can be difficult to use IFC labels to model certain security assumptions, such as semi-honest agents. Motivated by these modeling limitations, we study the algebraic semantics of lattice-based IFC label models, and propose a semantic framework that allows formalizing asymmetric delegation, which is partial delegation of confidentiality or integrity. Our framework supports downgrading of information and ensures their safety through nonmalleable information flow (NMIF). To demonstrate the practicality of our framework, we design and implement a novel algorithm that statically checks NMIF and a label inference procedure that efficiently supports bounded label polymorphism, allowing users to write code generic with respect to labels.

Silei Ren, Coşku Acay, Andrew C. Myers; ESORICS 2025

The Price of Tailoring the Index to Your Data: Poisoning Attacks on Learned Index Structures

Abstract

The concept of learned index structures relies on the idea that the input-output functionality of a database index can be viewed as a prediction task and, thus, implemented using a machine learning model instead of traditional algorithmic techniques. This novel angle for a decades-old problem has inspired exciting results at the intersection of machine learning and data structures. However, the advantage of learned index structures, i.e., the ability to adjust to the data at hand via the underlying ML-model, can become a disadvantage from a security perspective as it could be exploited. In this work, we present the! rst study of data poisoning attacks on learned index structures. Our poisoning approach is di"erent from all previous works since the model under attack is trained on a cumulative distribution function (CDF) and, thus, every injection on the training set has a cascading impact on multiple data values. We formulate the! rst poisoning attacks on linear regression models trained on a CDF, which is a basic building block of the proposed learned index structures. We generalize our poisoning techniques to attack the advanced two-stage design of learned index structures called recursive model index (RMI), which has been shown to outperform traditional B-Trees. We evaluate our attacks under a variety of parameterizations of the model and show that the error of the RMI increases up to 300X and the error of its second-stagemodels increases up to 3000X.

Evgenios M Kornaropoulos, Silei Ren, Roberto Tamassia; SIGMOD 2022

Project

2022.6 - 2023.5

Viaduct

Viaduct is an extensible, optimizing compiler that automatically employs cryptography to enforce high-level security specifications.

Talk/Presentation

Aug 2025

Type Confusion   Upstate PL Seminar / Ithaca, NY, USA

Original research presented at Upstate PL Seminar.
Oct 2023

Trust Delegation in Information Flow Control Systems   UC Berkeley Programming Systems Seminar / Berkeley, CA, USA

Original research presented at UC Berkeley Programming Systems Seminar.
Mar 2025

Algebraic Subtyping   Cornell PLDG Seminar / Ithaca, NY, USA

Reading group presentation on the work of S. Dolan, et al.
Mar 2024

Universal Composability is Robust Compilation   Cornell PLDG Seminar / Ithaca, NY, USA

Reading group presentation on the work of M. Patrignani, et al.
Nov 2022

A Quantale of Information   Cornell PLDG Seminar / Ithaca, NY, USA

Reading group presentation on the work of S. Hunt, et al.