I'm Kevin Loughlin (pronounced Lock-lin, but I think my efforts are futile at this point), a Ph.D. candidate in Computer Science and Engineering (CSE) at the University of Michigan. I am advised by Baris Kasikci.
My research is at the intersection of hardware-software co-design and security. I am interested in creating novel hardware interfaces for software systems, in order to afford the programmer maximal control of the security, speed, and resource utilization of their code. As of late, my work has focused on creating efficient mitigations for microarchitectural exploits such as Spectre and Rowhammer. I am grateful to be supported by an NSF Graduate Research Fellowship and a Google PhD Fellowship.
Before UMich, I received my bachelor's degree in Computer Science from Harvard University, where I worked with James Mickens. When I'm not coding, I enjoy playing and watching soccer, skiing, traveling, and speaking foreign languages like French and Spanish.
- September 2021: I am honored to receive a Google PhD Fellowship in Privacy and Security. Thanks Google!
- June 2021: I am excited to begin my second research internship at Microsoft, this time with the Office of the CTO team in Azure for Operators (AFO OCTO). I am working on enhancing DRAM for 5G workloads under the mentorship of Alec Wolman.
- April 2021: Stop! Hammer Time: Rethinking Our Approach to Rowhammer Mitigations is accepted to appear at HotOS '21. Our (rhyming!) presentation video is available here.
- September 2020: DOLMA: Securing Speculation with the Principle of Transient Non-Observability is accepted to appear at USENIX Security '21. Code available here.
- June 2020: I am excited to be interning with the Mobility and Networking Research (MNR) Group at Microsoft Research. I am working on Project STEMA under the mentorship of Stefan Saroiu.
- March 2020: I am honored to receive an NSF Graduate Research Fellowship. Thanks NSF!
- January 2020: NDA is selected as an IEEE Micro Top Picks 2020 Honorable Mention.
- January 2020: A Hypervisor for Shared-Memory FPGA Platforms is accepted to appear at ASPLOS '20.
- July 2019: NDA: Preventing Speculative Execution Attacks at Their Source is accepted to appear at MICRO '19.