I am pursuing a PhD in Computer Science at Yale University under the guidance of Ruzica Piskac and Jakub Szefer. My research focuses on the learning of randomized reductions and program properties (Bitween), with applications in hardware security, private computation, and quantum circuits.
Currently, I am an Applied Scientist Intern at the Automated Reasoning Group at AWS, where I work on Neuro-Symbolic AI to prevent factual errors caused by LLM hallucinations using mathematically sound Automated Reasoning checks (Amazon Bedrock Guardrails).
During my PhD, I investigated side-channel vulnerabilities in low-level post-quantum cryptographic code (EuroS&P 2023) and reverse-engineered quantum circuits from power traces (CHES 2024, CCS 2023). I also explored quantum fault injections and malware (QCE 2024, HOST 2023), analyzed non-functional behaviors of intermittent programs (TECS 2023), developed software countermeasures using randomized reductions (ICCAD 2024), and surveyed security verification techniques (JETC 2023).
Before my PhD, I applied formal methods in industry as a research software engineer through my start-up, contributing to several research collaborations (COMPSAC 2019, FSE 2018, FSE 2017, ASE 2017, SAC 2017).
PhD in Computer Science, 2025
Yale University, CT, US
MSc, MPhil in Computer Science
Yale University, CT, US
MSc in Information Technologies
Ege University, Izmir, TR
BSc in Computer Science
Dokuz Eylul University, Izmir, TR
Research Asistant:
Teaching Asistant:
This work shows the first exploration and study of power-based side-channel attacks in quantum computers. The explored attacks could be used to recover information about the control pulses sent to these computers. By analyzing these control pulses, attackers can reverse-engineer the equivalent gate-level description of the circuits, and the algorithms being run, or data hard-coded into the circuits.
Pascal is a tool that introduces novel symbolic register analysis techniques for constant-time low-level cryptographic code, and verifies locations of potential single-trace power side-channel vulnerabilities with high precision. Pascal is evaluated on a number of implementations of post-quantum cryptographic algorithms, and it is able to find dozens of previously reported single-trace power side-channel vulnerabilities in these algorithms, all in an automated manner.
Energy harvesting battery-free embedded devices rely only on ambient energy harvesting that enables stand-alone and sustainable IoT applications. These devices execute programs intermittently when the harvested ambient energy in their energy reservoir is sufficient to operate and stop execution abruptly (and start charging) otherwise. This work presents a probabilistic symbolic execution approach that analyzes the timing and energy behavior of intermittent programs at compile time.