We are mainly interested in security of emerging systems especially on cloud computing systems, networked systems, embedded systems. We often takes the approach of reevaluating existing security mechanisms as well as the actual system implementation and evaluation in real computing systems.