Search Results - "Stapf, Emmanuel"
-
1
Offline Model Guard: Secure and Private ML on Mobile Devices
Published in 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2020)“…Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data)…”
Get full text
Conference Proceeding -
2
On the Security of Strong Memristor-based Physically Unclonable Functions
Published in 2020 57th ACM/IEEE Design Automation Conference (DAC) (01-07-2020)“…PUFs are cost-effective security primitives that extract unique identifiers from integrated circuits. However, since their introduction, PUFs have been subject…”
Get full text
Conference Proceeding -
3
SafeTEE: Combining Safety and Security on ARM-based Microcontrollers
Published in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE) (14-03-2022)“…From industry automation to smart home, embedded devices are already ubiquitous, and the number of applications continues to grow rapidly. However, the…”
Get full text
Conference Proceeding -
4
Developing Privacy-preserving AI Systems: The Lessons learned
Published in 2020 57th ACM/IEEE Design Automation Conference (DAC) (01-07-2020)“…Advances in customers' data privacy laws create pressures and pain points across the entire lifecycle of AI products. Working figures such as data scientists…”
Get full text
Conference Proceeding -
5
INVITED: AI Utopia or Dystopia - On Securing AI Platforms
Published in 2020 57th ACM/IEEE Design Automation Conference (DAC) (01-07-2020)“…Today we are witnessing the widespread deployment of AI algorithms on many computing platforms already to provide various services, thus driving the growing…”
Get full text
Conference Proceeding -
6
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures
Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05-12-2021)“…Emerging applications, like cloud services, are demanding more computational power, while also giving rise to various security and privacy challenges. Current…”
Get full text
Conference Proceeding -
7
Programs That Test Themselves
Published in Computer (Long Beach, Calif.) (01-09-2009)“…The AutoTest framework automates the software testing process by relying on programs that contain the instruments of their own verification, in the form of…”
Get full text
Journal Article -
8
DARWIN: Survival of the Fittest Fuzzing Mutators
Published 21-10-2022“…Annual Network and Distributed System Security Symposium, NDSS, 2023 Fuzzing is an automated software testing technique broadly adopted by the industry. A…”
Get full text
Journal Article -
9
Trusted Container Extensions for Container-based Confidential Computing
Published 11-05-2022“…Cloud computing has emerged as a corner stone of today's computing landscape. More and more customers who outsource their infrastructure benefit from the…”
Get full text
Journal Article -
10
In Hardware We Trust? From TPM to Enclave Computing on RISC-V
Published in 2021 IFIP/IEEE 29th International Conference on Very Large Scale Integration (VLSI-SoC) (04-10-2021)“…System-on-Chip platforms have been increasingly extended with trusted computing functionality to provide strong protection for sensitive software applications…”
Get full text
Conference Proceeding -
11
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures
Published 15-10-2021“…Shared cache resources in multi-core processors are vulnerable to cache side-channel attacks. Recently proposed defenses have their own caveats:…”
Get full text
Journal Article -
12
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
Published 29-10-2020“…Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from…”
Get full text
Journal Article -
13
Towards Fine Grained Network Flow Prediction
Published 20-08-2018“…One main challenge for the design of networks is that traffic load is not generally known in advance. This makes it hard to adequately devote resources such as…”
Get full text
Journal Article -
14
INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security
Published in 2019 56th ACM/IEEE Design Automation Conference (DAC) (01-06-2019)“…Data processing and communication in almost all electronic systems are based on Central Processing Units (CPUs). In order to guarantee confidentiality and…”
Get full text
Conference Proceeding -
15
Offline Model Guard: Secure and Private ML on Mobile Devices
Published 05-07-2020“…DATE 2020, pages 460-465 Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client…”
Get full text
Journal Article -
16
Trustworthy AI Inference Systems: An Industry Research View
Published 10-08-2020“…In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference…”
Get full text
Journal Article -
17
Trusted Execution Environments: Properties, Applications, and Challenges
Published in IEEE security & privacy (01-03-2020)“…Software attacks on modern computer systems have been a persisting challenge for several decades, leading to a continuous arms race between attacks and…”
Get full text
Magazine Article -
18
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security
Published in IEEE security & privacy (01-09-2020)“…The increasing complexity of modern computing devices has rendered security architectures vulnerable to recent side-channel and transient-execution attacks. We…”
Get full text
Magazine Article