Volgen
Supraja Sridhara
Supraja Sridhara
Geverifieerd e-mailadres voor inf.ethz.ch - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
{HECKLER}: Breaking Confidential {VMs} with Malicious Interrupts
B Schlüter, S Sridhara, M Kuhne, A Bertschi, S Shinde
33rd USENIX Security Symposium (USENIX Security 24), 3459-3476, 2024
192024
WeSee: using malicious# VC interrupts to break AMD SEV-SNP
B Schlüter, S Sridhara, A Bertschi, S Shinde
2024 IEEE Symposium on Security and Privacy (SP), 4220-4238, 2024
172024
{ACAI}: Protecting Accelerator Execution with Arm Confidential Computing Architecture
S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde
33rd USENIX Security Symposium (USENIX Security 24), 3423-3440, 2024
11*2024
Global distributed secure mapping of network addresses
S Sridhara, F Wirz, J Ruiter, C Schutijser, M Legner, A Perrig
Proceedings of the ACM SIGCOMM 2021 Workshop on Technologies, Applications …, 2021
82021
Empowering data centers for next generation trusted computing
A Dhar, S Sridhara, S Shinde, S Capkun, R Andri
arXiv preprint arXiv:2211.00306, 2022
52022
Aster: Fixing the android tee ecosystem with arm cca
M Kuhne, S Sridhara, A Bertschi, N Dutly, S Capkun, S Shinde
arXiv preprint arXiv:2407.16694, 2024
12024
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
S Sridhara, A Bertschi, B Schlüter, S Shinde
arXiv preprint arXiv:2404.13998, 2024
12024
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation
A Bertschi, S Sridhara, F Groschupp, M Kuhne, B Schlüter, C Thorens, ...
arXiv preprint arXiv:2408.05835, 2024
2024
Confidential Computing with Heterogeneous Devices at Cloud-Scale
A Dhar, S Sridhara, S Shinde, S Capkun, R Andri
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–9