NAUTILUS: Fishing for Deep Bugs with Grammars C Aschermann, P Jauernig, T Frassetto, AR Sadeghi, T Holz, D Teuchert 26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019 | 251 | 2019 |
SANCTUARY: ARMing TrustZone with User-space Enclaves F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf 26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019 | 176 | 2019 |
FastKitten: Practical Smart Contracts on Bitcoin P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ... 28th USENIX Security Symposium (USENIX Security 19), 2019 | 123 | 2019 |
CURE: A Security Architecture with CUstomizable and Resilient Enclaves R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ... 30th USENIX Security Symposium (USENIX Security 21), 2021 | 115 | 2021 |
Trusted Execution Environments: Properties, Applications, and Challenges P Jauernig, AR Sadeghi, E Stapf IEEE Security & Privacy 18 (2), 56-60, 2020 | 91 | 2020 |
IMIX: In-Process Memory Isolation EXtension T Frassetto, P Jauernig, C Liebchen, AR Sadeghi 27th USENIX Security Symposium (USENIX Security 18), 2018 | 85 | 2018 |
Offline Model Guard: Secure and Private ML on Mobile Devices SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ... 23. Design, Automation and Test in Europe Conference (DATE '20), 2020 | 49 | 2020 |
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities R Kande, A Crump, G Persyn, P Jauernig, AR Sadeghi, A Tyagi, ... | 47* | 2022 |
POSE: Practical off-chain smart contract execution T Frassetto, P Jauernig, D Koisser, D Kretzler, B Schlosser, S Faust, ... arXiv preprint arXiv:2210.07110, 2022 | 16 | 2022 |
Riscyrop: Automated return-oriented programming attacks on risc-v and arm64 T Cloosters, D Paaßen, J Wang, O Draissi, P Jauernig, E Stapf, L Davi, ... Proceedings of the 25th International Symposium on Research in Attacks …, 2022 | 11 | 2022 |
Cloud computing security: foundations and research directions A Chakraborti, R Curtmola, J Katz, J Nieh, AR Sadeghi, R Sion, Y Zhang Foundations and Trends® in Privacy and Security 3 (2), 103-213, 2022 | 11 | 2022 |
DARWIN: Survival of the Fittest Fuzzing Mutators P Jauernig, D Jakobovic, S Picek, E Stapf, AR Sadeghi NDSS, 2023 | 10 | 2023 |
Trusted container extensions for container-based confidential computing F Brasser, P Jauernig, F Pustelnik, AR Sadeghi, E Stapf arXiv preprint arXiv:2205.05747, 2022 | 10 | 2022 |
In Hardware We Trust: Gains and Pains of Hardware-assisted Security L Batina, P Jauernig, N Mentens, AR Sadeghi, E Stapf Proceedings of the 56th Annual Design Automation Conference 2019, 2019 | 10 | 2019 |
Offline model guard: Secure and private ml on mobile devices. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE) SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ... IEEE, 2020 | 9 | 2020 |
CFINSIGHT: A Comprehensive Metric for CFI Policies T Frassetto, P Jauernig, D Koisser, AR Sadeghi | 7 | 2022 |
Privacy-Preserving Speech Processing via STPC and TEEs SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ... | 6 | 2020 |
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf IEEE Security & Privacy 18 (5), 57-66, 2020 | 5 | 2020 |
{V'CER}: Efficient Certificate Validation in Constrained Networks D Koisser, P Jauernig, G Tsudik, AR Sadeghi 31st USENIX Security Symposium (USENIX Security 22), 4491-4508, 2022 | 3 | 2022 |
Method and apparatus for isolating sensitive untrusted program code on mobile device E Stapf, P Jauernig, F Brasser, AR Sadeghi US Patent App. 17/287,617, 2021 | 3 | 2021 |