Search Results - "Stapf, Emmanuel"

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Offline Model Guard: Secure and Private ML on Mobile Devices by Bayerl, Sebastian P., Frassetto, Tommaso, Jauernig, Patrick, Riedhammer, Korbinian, Sadeghi, Ahmad-Reza, Schneider, Thomas, Stapf, Emmanuel, Weinert, Christian

    “…Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data)…”
    Get full text
    Conference Proceeding
  2. 2

    On the Security of Strong Memristor-based Physically Unclonable Functions by Zeitouni, Shaza, Stapf, Emmanuel, Fereidooni, Hossein, Sadeghi, Ahmad-Reza

    “…PUFs are cost-effective security primitives that extract unique identifiers from integrated circuits. However, since their introduction, PUFs have been subject…”
    Get full text
    Conference Proceeding
  3. 3

    SafeTEE: Combining Safety and Security on ARM-based Microcontrollers by Schonstedt, Martin, Brasser, Ferdinand, Jauernig, Patrick, Stapf, Emmanuel, Sadeghi, Ahmad-Reza

    “…From industry automation to smart home, embedded devices are already ubiquitous, and the number of applications continues to grow rapidly. However, the…”
    Get full text
    Conference Proceeding
  4. 4

    Developing Privacy-preserving AI Systems: The Lessons learned by Chen, Huili, Hussain, Siam Umar, Boemer, Fabian, Stapf, Emmanuel, Sadeghi, Ahmad Reza, Koushanfar, Farinaz, Cammarota, Rosario

    “…Advances in customers' data privacy laws create pressures and pain points across the entire lifecycle of AI products. Working figures such as data scientists…”
    Get full text
    Conference Proceeding
  5. 5

    INVITED: AI Utopia or Dystopia - On Securing AI Platforms by Dessouky, Ghada, Jauernig, Patrick, Mentens, Nele, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    “…Today we are witnessing the widespread deployment of AI algorithms on many computing platforms already to provide various services, thus driving the growing…”
    Get full text
    Conference Proceeding
  6. 6

    Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures by Dessouky, Ghada, Isakov, Mihailo, Kinsy, Michel A., Mahmoody, Pouya, Mark, Miguel, Sadeghi, Ahmad-Reza, Stapf, Emmanuel, Zeitouni, Shaza

    “…Emerging applications, like cloud services, are demanding more computational power, while also giving rise to various security and privacy challenges. Current…”
    Get full text
    Conference Proceeding
  7. 7

    Programs That Test Themselves by Meyer, B., Fiva, A., Ciupa, I., Leitner, A., Yi Wei, Stapf, E.

    Published in Computer (Long Beach, Calif.) (01-09-2009)
    “…The AutoTest framework automates the software testing process by relying on programs that contain the instruments of their own verification, in the form of…”
    Get full text
    Journal Article
  8. 8

    DARWIN: Survival of the Fittest Fuzzing Mutators by Jauernig, Patrick, Jakobovic, Domagoj, Picek, Stjepan, Stapf, Emmanuel, Sadeghi, Ahmad-Reza

    Published 21-10-2022
    “…Annual Network and Distributed System Security Symposium, NDSS, 2023 Fuzzing is an automated software testing technique broadly adopted by the industry. A…”
    Get full text
    Journal Article
  9. 9

    Trusted Container Extensions for Container-based Confidential Computing by Brasser, Ferdinand, Jauernig, Patrick, Pustelnik, Frederik, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published 11-05-2022
    “…Cloud computing has emerged as a corner stone of today's computing landscape. More and more customers who outsource their infrastructure benefit from the…”
    Get full text
    Journal Article
  10. 10

    In Hardware We Trust? From TPM to Enclave Computing on RISC-V by Stapf, Emmanuel, Jauernig, Patrick, Brasser, Ferdinand, Sadeghi, Ahmad-Reza

    “…System-on-Chip platforms have been increasingly extended with trusted computing functionality to provide strong protection for sensitive software applications…”
    Get full text
    Conference Proceeding
  11. 11

    Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures by Dessouky, Ghada, Gruler, Alexander, Mahmoody, Pouya, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published 15-10-2021
    “…Shared cache resources in multi-core processors are vulnerable to cache side-channel attacks. Recently proposed defenses have their own caveats:…”
    Get full text
    Journal Article
  12. 12

    CURE: A Security Architecture with CUstomizable and Resilient Enclaves by Bahmani, Raad, Brasser, Ferdinand, Dessouky, Ghada, Jauernig, Patrick, Klimmek, Matthias, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published 29-10-2020
    “…Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from…”
    Get full text
    Journal Article
  13. 13

    Towards Fine Grained Network Flow Prediction by Jahnke, Patrick, Stapf, Emmanuel, Mieseler, Jonas, Neumann, Gerhard, Eugster, Patrick

    Published 20-08-2018
    “…One main challenge for the design of networks is that traffic load is not generally known in advance. This makes it hard to adequately devote resources such as…”
    Get full text
    Journal Article
  14. 14

    INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security by Batina, Lejla, Jauernig, Patrick, Mentens, Nele, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    “…Data processing and communication in almost all electronic systems are based on Central Processing Units (CPUs). In order to guarantee confidentiality and…”
    Get full text
    Conference Proceeding
  15. 15

    Offline Model Guard: Secure and Private ML on Mobile Devices by Bayerl, Sebastian P, Frassetto, Tommaso, Jauernig, Patrick, Riedhammer, Korbinian, Sadeghi, Ahmad-Reza, Schneider, Thomas, Stapf, Emmanuel, Weinert, Christian

    Published 05-07-2020
    “…DATE 2020, pages 460-465 Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Trusted Execution Environments: Properties, Applications, and Challenges by Jauernig, Patrick, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published in IEEE security & privacy (01-03-2020)
    “…Software attacks on modern computer systems have been a persisting challenge for several decades, leading to a continuous arms race between attacks and…”
    Get full text
    Magazine Article
  18. 18

    With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security by Dessouky, Ghada, Frassetto, Tommaso, Jauernig, Patrick, Sadeghi, Ahmad-Reza, Stapf, Emmanuel

    Published in IEEE security & privacy (01-09-2020)
    “…The increasing complexity of modern computing devices has rendered security architectures vulnerable to recent side-channel and transient-execution attacks. We…”
    Get full text
    Magazine Article