Rethinking software runtimes for disaggregated memory I Calciu, MT Imran, I Puddu, S Kashyap, HA Maruf, O Mutlu, A Kolli Proceedings of the 26th ACM International Conference on Architectural …, 2021 | 149 | 2021 |
μchain: How to Forget without Hard Forks. I Puddu, A Dmitrienko, S Capkun IACR Cryptology ePrint Archive 2017, 106, 2017 | 137 | 2017 |
Method for operating a blockchain I Puddu, A Dmitrienko, G Karame, S Capkun US Patent App. 16/495,436, 2020 | 98 | 2020 |
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend I Puddu, M Schneider, M Haller, S Čapkun Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), 663--680, 2021 | 58 | 2021 |
CODIC: A low-cost substrate for enabling custom in-DRAM functionalities and optimizations L Orosa, Y Wang, M Sadrosadati, JS Kim, M Patel, I Puddu, H Luo, ... 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021 | 52* | 2021 |
Project PBerry: FPGA Acceleration for Remote Memory I Calciu, I Puddu, A Kolli, A Nowatzyk, J Gandhi, O Mutlu, ... Proceedings of the Workshop on Hot Topics in Operating Systems, 127-135, 2019 | 38 | 2019 |
Proximitee: Hardened sgx attestation by proximity verification A Dhar, I Puddu, K Kostiainen, S Capkun Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020 | 34* | 2020 |
IChannels: exploiting current management mechanisms to create covert channels in modern processors J Haj-Yahya, JS Kim, AG Yağlıkçı, I Puddu, L Luna, Orosa, J Gómez, ... 2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021 | 27 | 2021 |
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks P Leu, I Puddu, A Ranganathan, S Čapkun Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 23 | 2018 |
Composite Enclaves: Towards Disaggregated Trusted Execution M Schneider, A Dhar, I Puddu, K Kostiainen, S Čapkun IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1 …, 2021 | 17* | 2021 |
On (The Lack Of) code confidentiality in trusted execution environments I Puddu, M Schneider, D Lain, S Boschetto, S Čapkun 2024 IEEE Symposium on Security and Privacy (SP), 213-213, 2024 | 8 | 2024 |
TEEvil: Identity Lease via Trusted Execution Environments I Puddu, D Lain, M Schneider, E Tretiakova, S Matetic, S Capkun arXiv preprint arXiv:1903.00449, 2019 | 5 | 2019 |
It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones F Groschupp, M Kuhne, M Schneider, I Puddu, S Shinde, S Capkun arXiv preprint arXiv:2211.05206, 2022 | 2 | 2022 |
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones F Groschupp, M Schneider, I Puddu, S Shinde, S Capkun arXiv preprint arXiv:2102.02743, 2021 | 2 | 2021 |
Understanding the Capabilities of Privileged Attackers Against Trusted Execution Environments I Puddu ETH Zurich, 2023 | 1 | 2023 |
Using Local Cache Coherence for Disaggregated Memory Systems I Calciu, MT Imran, I Puddu, S Kashyap, H Al Maruf, O Mutlu, A Kolli ACM SIGOPS Operating Systems Review 57 (1), 21-28, 2023 | | 2023 |
The Mutable Blockchain I Puddu ETH Zurich, 2016 | | 2016 |
Rethinking Software Runtimes for Disaggregated Memory Extended Abstract I Calciu, T Imran, I Puddu, S Kashyap, H Maruf, O Mutlu, A Kolli | | |