关注
Patrick Jauernig
Patrick Jauernig
SANCTUARY Systems GmbH
在 sanctuary.dev 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
NAUTILUS: Fishing for Deep Bugs with Grammars
C Aschermann, P Jauernig, T Frassetto, AR Sadeghi, T Holz, D Teuchert
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
2512019
SANCTUARY: ARMing TrustZone with User-space Enclaves
F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
1762019
FastKitten: Practical Smart Contracts on Bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX Security Symposium (USENIX Security 19), 2019
1232019
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 2021
1152021
Trusted Execution Environments: Properties, Applications, and Challenges
P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (2), 56-60, 2020
912020
IMIX: In-Process Memory Isolation EXtension
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th USENIX Security Symposium (USENIX Security 18), 2018
852018
Offline Model Guard: Secure and Private ML on Mobile Devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
23. Design, Automation and Test in Europe Conference (DATE '20), 2020
492020
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
R Kande, A Crump, G Persyn, P Jauernig, AR Sadeghi, A Tyagi, ...
47*2022
POSE: Practical off-chain smart contract execution
T Frassetto, P Jauernig, D Koisser, D Kretzler, B Schlosser, S Faust, ...
arXiv preprint arXiv:2210.07110, 2022
162022
Riscyrop: Automated return-oriented programming attacks on risc-v and arm64
T Cloosters, D Paaßen, J Wang, O Draissi, P Jauernig, E Stapf, L Davi, ...
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
112022
Cloud computing security: foundations and research directions
A Chakraborti, R Curtmola, J Katz, J Nieh, AR Sadeghi, R Sion, Y Zhang
Foundations and Trends® in Privacy and Security 3 (2), 103-213, 2022
112022
DARWIN: Survival of the Fittest Fuzzing Mutators
P Jauernig, D Jakobovic, S Picek, E Stapf, AR Sadeghi
NDSS, 2023
102023
Trusted container extensions for container-based confidential computing
F Brasser, P Jauernig, F Pustelnik, AR Sadeghi, E Stapf
arXiv preprint arXiv:2205.05747, 2022
102022
In Hardware We Trust: Gains and Pains of Hardware-assisted Security
L Batina, P Jauernig, N Mentens, AR Sadeghi, E Stapf
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
102019
Offline model guard: Secure and private ml on mobile devices. In 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
IEEE, 2020
92020
CFINSIGHT: A Comprehensive Metric for CFI Policies
T Frassetto, P Jauernig, D Koisser, AR Sadeghi
72022
Privacy-Preserving Speech Processing via STPC and TEEs
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
62020
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
52020
{V'CER}: Efficient Certificate Validation in Constrained Networks
D Koisser, P Jauernig, G Tsudik, AR Sadeghi
31st USENIX Security Symposium (USENIX Security 22), 4491-4508, 2022
32022
Method and apparatus for isolating sensitive untrusted program code on mobile device
E Stapf, P Jauernig, F Brasser, AR Sadeghi
US Patent App. 17/287,617, 2021
32021
系统目前无法执行此操作,请稍后再试。
文章 1–20