SANCTUARY: ARMing TrustZone with User-space Enclaves. F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf NDSS, 2019 | 189 | 2019 |
{CURE}: A security architecture with {CUstomizable} and resilient enclaves R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ... 30th USENIX Security Symposium (USENIX Security 21), 1073-1090, 2021 | 130 | 2021 |
Trusted execution environments: properties, applications, and challenges P Jauernig, AR Sadeghi, E Stapf IEEE Security & Privacy 18 (2), 56-60, 2020 | 99 | 2020 |
Offline model guard: Secure and private ML on mobile devices SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ... 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), 460-465, 2020 | 55 | 2020 |
Chunked-cache: On-demand and scalable cache isolation for security architectures G Dessouky, A Gruler, P Mahmoody, AR Sadeghi, E Stapf arXiv preprint arXiv:2110.08139, 2021 | 22 | 2021 |
Developing privacy-preserving AI systems: The lessons learned H Chen, SU Hussain, F Boemer, E Stapf, AR Sadeghi, F Koushanfar, ... 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-4, 2020 | 19 | 2020 |
Riscyrop: Automated return-oriented programming attacks on risc-v and arm64 T Cloosters, D Paaßen, J Wang, O Draissi, P Jauernig, E Stapf, L Davi, ... Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 16 | 2022 |
DARWIN: Survival of the fittest fuzzing mutators P Jauernig, D Jakobovic, S Picek, E Stapf, AR Sadeghi arXiv preprint arXiv:2210.11783, 2022 | 16 | 2022 |
Trusted container extensions for container-based confidential computing F Brasser, P Jauernig, F Pustelnik, AR Sadeghi, E Stapf arXiv preprint arXiv:2205.05747, 2022 | 14 | 2022 |
Trustworthy AI inference systems: An industry research view R Cammarota, M Schunter, A Rajan, F Boemer, Á Kiss, A Treiber, ... arXiv preprint arXiv:2008.04449, 2020 | 14 | 2020 |
Cloud computing security: foundations and research directions A Chakraborti, R Curtmola, J Katz, J Nieh, AR Sadeghi, R Sion, Y Zhang Foundations and Trends® in Privacy and Security 3 (2), 103-213, 2022 | 11 | 2022 |
Offline model guard: Secure and private ml on mobile devices. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ... IEEE, 2020 | 11 | 2020 |
In hardware we trust: Gains and pains of hardware-assisted security L Batina, P Jauernig, N Mentens, AR Sadeghi, E Stapf Proceedings of the 56th Annual Design Automation Conference 2019, 1-4, 2019 | 10 | 2019 |
On the security of strong memristor-based physically unclonable functions S Zeitouni, E Stapf, H Fereidooni, AR Sadeghi 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 9 | 2020 |
Privacy-preserving speech processing via STPC and TEEs SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ... Proceedings of the PPMI, 2019 | 7 | 2019 |
Enclave Computing on RISC-V: A Brighter Future for Security? G Dessouky, AR Sadeghi, E Stapf | 6 | 2020 |
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf IEEE Security & Privacy 18 (5), 57-66, 2020 | 5 | 2020 |
SafeTEE: combining safety and security on ARM-based microcontrollers M Schönstedt, F Brasser, P Jauernig, E Stapf, AR Sadeghi 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 520-525, 2022 | 3 | 2022 |
Method and apparatus for isolating sensitive untrusted program code on mobile device E Stapf, P Jauernig, F Brasser, AR Sadeghi US Patent App. 17/287,617, 2021 | 3 | 2021 |
Towards fine grained network flow prediction P Jahnke, E Stapf, J Mieseler, G Neumann, P Eugster arXiv preprint arXiv:1808.06453, 2018 | 3 | 2018 |