Affiliated Department or Office
Computer Science Department
Education
PhD Cryptography Middle East Technical University 2016

Koksal Mus’ research and teaching interests focus on cybersecurity, cryptography, and computer engineering, with expertise extending to hardware programming and applied security. His research includes the standardization of quantum-computer-resistant security and the development of future cybersecurity standards. His work has been published in top-tier security conferences, including the ACM Conference on Computer and Communications Security (CCS) and the IEEE European Symposium on Security and Privacy (Euro S&P). He is also a patent holder in verifiable internet voting, with a focus on providing digital security through personal computers.

In his teaching, Prof. Mus is deeply committed to student-centered, active-learning pedagogies that help students connect theoretical foundations with hands-on, practice-oriented projects. His current teaching interests include the integration of generative AI and virtual learning assistants into STEM education, project-based learning, flipped classroom models, and inclusive course design. He is especially interested in using AI-supported learning environments to improve student engagement, creativity, critical thinking, and self-efficacy in cybersecurity and computer engineering courses. Across undergraduate and graduate courses, Prof. Mus aims to create learning experiences that help students move beyond technical understanding toward design, analysis, adversarial thinking, and real-world problem solving.

Email
kmus@wpi.edu
Affiliated Department or Office
Computer Science Department
Education
PhD Cryptography Middle East Technical University 2016

Koksal Mus’ research and teaching interests focus on cybersecurity, cryptography, and computer engineering, with expertise extending to hardware programming and applied security. His research includes the standardization of quantum-computer-resistant security and the development of future cybersecurity standards. His work has been published in top-tier security conferences, including the ACM Conference on Computer and Communications Security (CCS) and the IEEE European Symposium on Security and Privacy (Euro S&P). He is also a patent holder in verifiable internet voting, with a focus on providing digital security through personal computers.

In his teaching, Prof. Mus is deeply committed to student-centered, active-learning pedagogies that help students connect theoretical foundations with hands-on, practice-oriented projects. His current teaching interests include the integration of generative AI and virtual learning assistants into STEM education, project-based learning, flipped classroom models, and inclusive course design. He is especially interested in using AI-supported learning environments to improve student engagement, creativity, critical thinking, and self-efficacy in cybersecurity and computer engineering courses. Across undergraduate and graduate courses, Prof. Mus aims to create learning experiences that help students move beyond technical understanding toward design, analysis, adversarial thinking, and real-world problem solving.

Office
Atwater Kent 309
Sustainable Development Goals

SDG 4: Quality Education

SDG 4: Quality Education - Ensure inclusive and equitable quality education and promote lifelong learning opportunities for all

Quality Education Goal

SDG 16: Peace, Justice, and Strong Institutions

SDG 16: Peace, Justice, and Strong Institutions - Promote peaceful and inclusive societies for sustainable development, provide access to justice for all and build effective, accountable and inclusive institutions at all levels

Peace, Justice, and Strong Institutions Goal

Scholarly Work

  1. Mus, K., Doroz, Y., Tol, M. C., Rahman, K., & Sunar, B. (2023). Jolt: Recovering TLS Signing Keys via Rowhammer Faults. Proceedings - IEEE Symposium on Security and Privacy (S&P 23), 1719–1736. https://doi.org/10.1109/SP46215.2023.10179450
  2. Islam, S., Mus, K., Singh, R., Schaumont, P., & Sunar, B. (2022). Signature Correction Attack on Dilithium Signature Scheme. In 7th IEEE European Symposium on Security and Privacy (Euro S&P 22). https://doi.org/10.48550/arxiv.2203.00637
  3. *Mus, K., *Islam, S., & Sunar, B. (2020). QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme. Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS 20), 1071–1084. https://doi.org/10.1145/3372297.3417272