Follow
Patrick Jauernig
Patrick Jauernig
SANCTUARY Systems GmbH
Verified email at sanctuary.dev - Homepage
Title
Cited by
Cited by
Year
NAUTILUS: Fishing for Deep Bugs with Grammars
C Aschermann, P Jauernig, T Frassetto, AR Sadeghi, T Holz, D Teuchert
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
2752019
SANCTUARY: ARMing TrustZone with User-space Enclaves
F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
1892019
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 2021
1302021
FastKitten: Practical Smart Contracts on Bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX Security Symposium (USENIX Security 19), 2019
1302019
Trusted Execution Environments: Properties, Applications, and Challenges
P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (2), 56-60, 2020
992020
IMIX: In-Process Memory Isolation EXtension
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th USENIX Security Symposium (USENIX Security 18), 2018
912018
Offline Model Guard: Secure and Private ML on Mobile Devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
23. Design, Automation and Test in Europe Conference (DATE '20), 2020
552020
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
R Kande, A Crump, G Persyn, P Jauernig, AR Sadeghi, A Tyagi, ...
54*2022
POSE: Practical off-chain smart contract execution
T Frassetto, P Jauernig, D Koisser, D Kretzler, B Schlosser, S Faust, ...
arXiv preprint arXiv:2210.07110, 2022
252022
DARWIN: Survival of the Fittest Fuzzing Mutators
P Jauernig, D Jakobovic, S Picek, E Stapf, AR Sadeghi
NDSS, 2023
162023
Riscyrop: Automated return-oriented programming attacks on risc-v and arm64
T Cloosters, D Paaßen, J Wang, O Draissi, P Jauernig, E Stapf, L Davi, ...
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
162022
Trusted container extensions for container-based confidential computing
F Brasser, P Jauernig, F Pustelnik, AR Sadeghi, E Stapf
arXiv preprint arXiv:2205.05747, 2022
142022
Cloud computing security: foundations and research directions
A Chakraborti, R Curtmola, J Katz, J Nieh, AR Sadeghi, R Sion, Y Zhang
Foundations and Trends® in Privacy and Security 3 (2), 103-213, 2022
112022
CFINSIGHT: A Comprehensive Metric for CFI Policies
T Frassetto, P Jauernig, D Koisser, AR Sadeghi
112022
Offline model guard: Secure and private ml on mobile devices. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
IEEE, 2020
112020
In Hardware We Trust: Gains and Pains of Hardware-assisted Security
L Batina, P Jauernig, N Mentens, AR Sadeghi, E Stapf
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
102019
Privacy-Preserving Speech Processing via STPC and TEEs
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
72020
{V'CER}: Efficient Certificate Validation in Constrained Networks
D Koisser, P Jauernig, G Tsudik, AR Sadeghi
31st USENIX Security Symposium (USENIX Security 22), 4491-4508, 2022
52022
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
52020
VirTEE: A full backward-compatible TEE with native live migration and secure I/O
J Wang, P Mahmoody, F Brasser, P Jauernig, AR Sadeghi, D Yu, D Pan, ...
Proceedings of the 59th ACM/IEEE Design Automation Conference, 241-246, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20