关注
Benedict Schlüter
Benedict Schlüter
在 inf.ethz.ch 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Heckler: Breaking Confidential VMs with Malicious Interrupts
B Schlüter, S Sridhara, M Kuhne, A Bertschi, S Shinde
USENIX Security, 2024
92024
WeSee: Using Malicious# VC Interrupts to Break AMD SEV-SNP
B Schlüter, S Sridhara, A Bertschi, S Shinde
arXiv preprint arXiv:2404.03526, 2024
82024
ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators
S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde
arXiv preprint arXiv:2305.15986, 2023
52023
{ACAI}: Protecting Accelerator Execution with Arm Confidential Computing Architecture
S Sridhara, A Bertschi, B Schlüter, M Kuhne, F Aliberti, S Shinde
33rd USENIX Security Symposium (USENIX Security 24), 3423-3440, 2024
32024
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
S Sridhara, A Bertschi, B Schlüter, S Shinde
arXiv preprint arXiv:2404.13998, 2024
12024
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation
A Bertschi, S Sridhara, F Groschupp, M Kuhne, B Schlüter, C Thorens, ...
arXiv preprint arXiv:2408.05835, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–6