{HECKLER}: Breaking Confidential {VMs} with Malicious Interrupts B Schlüter, S Sridhara, M Kuhne, A Bertschi, S Shinde 33rd USENIX Security Symposium (USENIX Security 24), 3459-3476, 2024 | 19 | 2024 |
{ACAI}: Protecting Accelerator Execution with Arm Confidential Computing Architecture S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde 33rd USENIX Security Symposium (USENIX Security 24), 3423-3440, 2024 | 7 | 2024 |
ACAI: Extending Arm confidential computing architecture protection from CPUs to accelerators S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde arXiv preprint arXiv:2305.15986, 2023 | 4 | 2023 |
It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones F Groschupp, M Kuhne, M Schneider, I Puddu, S Shinde, S Capkun arXiv preprint arXiv:2211.05206, 2022 | 2 | 2022 |
Aster: Fixing the android tee ecosystem with arm cca M Kuhne, S Sridhara, A Bertschi, N Dutly, S Capkun, S Shinde arXiv preprint arXiv:2407.16694, 2024 | 1 | 2024 |
Dorami: Privilege Separating Security Monitor on RISC-V TEEs M Kuhne, S Volos, S Shinde arXiv preprint arXiv:2410.03653, 2024 | | 2024 |
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation A Bertschi, S Sridhara, F Groschupp, M Kuhne, B Schlüter, C Thorens, ... arXiv preprint arXiv:2408.05835, 2024 | | 2024 |