Heckler: Breaking Confidential VMs with Malicious Interrupts B Schlüter, S Sridhara, M Kuhne, A Bertschi, S Shinde USENIX Security, 2024 | 9 | 2024 |
ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde arXiv preprint arXiv:2305.15986, 2023 | 5 | 2023 |
{ACAI}: Protecting Accelerator Execution with Arm Confidential Computing Architecture S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde 33rd USENIX Security Symposium (USENIX Security 24), 3423-3440, 2024 | 3 | 2024 |
Aster: Fixing the android tee ecosystem with arm cca M Kuhne, S Sridhara, A Bertschi, N Dutly, S Capkun, S Shinde arXiv preprint arXiv:2407.16694, 2024 | 1 | 2024 |
It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones F Groschupp, M Kuhne, M Schneider, I Puddu, S Shinde, S Capkun arXiv preprint arXiv:2211.05206, 2022 | 1 | 2022 |
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation A Bertschi, S Sridhara, F Groschupp, M Kuhne, B Schlüter, C Thorens, ... arXiv preprint arXiv:2408.05835, 2024 | | 2024 |