Heckler: Breaking Confidential VMs with Malicious Interrupts B Schlüter, S Sridhara, M Kuhne, A Bertschi, S Shinde USENIX Security, 2024 | 9 | 2024 |
WeSee: Using Malicious# VC Interrupts to Break AMD SEV-SNP B Schlüter, S Sridhara, A Bertschi, S Shinde arXiv preprint arXiv:2404.03526, 2024 | 8 | 2024 |
ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde arXiv preprint arXiv:2305.15986, 2023 | 5 | 2023 |
{ACAI}: Protecting Accelerator Execution with Arm Confidential Computing Architecture S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde 33rd USENIX Security Symposium (USENIX Security 24), 3423-3440, 2024 | 3 | 2024 |
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals S Sridhara, A Bertschi, B Schlüter, S Shinde arXiv preprint arXiv:2404.13998, 2024 | 1 | 2024 |
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation A Bertschi, S Sridhara, F Groschupp, M Kuhne, B Schlüter, C Thorens, ... arXiv preprint arXiv:2408.05835, 2024 | | 2024 |