Software grand exposure:{SGX} cache attacks are practical F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi 11th USENIX workshop on offensive technologies (WOOT 17), 2017 | 725 | 2017 |
TyTAN: Tiny trust anchor for tiny devices F Brasser, B El Mahjoub, AR Sadeghi, C Wachsmann, P Koeberl Proceedings of the 52nd annual design automation conference, 1-6, 2015 | 310 | 2015 |
Seda: Scalable embedded device attestation N Asokan, F Brasser, A Ibrahim, AR Sadeghi, M Schunter, G Tsudik, ... Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 273 | 2015 |
NAUTILUS: Fishing for Deep Bugs with Grammars. C Aschermann, T Frassetto, T Holz, P Jauernig, AR Sadeghi, D Teuchert NDSS, 2019 | 243 | 2019 |
Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit. L Garcia, F Brasser, MH Cintuglu, AR Sadeghi, OA Mohammed, ... NDSS, 1-15, 2017 | 217 | 2017 |
SANCTUARY: ARMing TrustZone with User-space Enclaves. F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf NDSS, 2019 | 168 | 2019 |
HardIDX: Practical and secure index with SGX B Fuhry, R Bahmani, F Brasser, F Hahn, F Kerschbaum, AR Sadeghi Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 …, 2017 | 135 | 2017 |
{CAn’t} touch this: Software-only mitigation against rowhammer attacks targeting kernel memory F Brasser, L Davi, D Gens, C Liebchen, AR Sadeghi 26th USENIX Security Symposium (USENIX Security 17), 117-130, 2017 | 126 | 2017 |
{FastKitten}: Practical smart contracts on bitcoin P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ... 28th USENIX Security Symposium (USENIX Security 19), 801-818, 2019 | 115 | 2019 |
Secure multiparty computation from SGX R Bahmani, M Barbosa, F Brasser, B Portela, AR Sadeghi, G Scerri, ... International Conference on Financial Cryptography and Data Security, 477-497, 2017 | 111 | 2017 |
TIMBER-V: Tag-isolated memory bringing fine-grained enclaves to RISC-V S Weiser, M Werner, F Brasser, M Malenko, S Mangard, AR Sadeghi Proceedings 2019-Network and Distributed System Security Symposium (NDSS), 2019 | 108 | 2019 |
{CURE}: A security architecture with {CUstomizable} and resilient enclaves R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ... 30th USENIX Security Symposium (USENIX Security 21), 1073-1090, 2021 | 98 | 2021 |
{IMIX}:{In-Process} Memory Isolation {EXtension} T Frassetto, P Jauernig, C Liebchen, AR Sadeghi 27th USENIX Security Symposium (USENIX Security 18), 83-97, 2018 | 82 | 2018 |
Trusted execution environments: properties, applications, and challenges P Jauernig, AR Sadeghi, E Stapf IEEE Security & Privacy 18 (2), 56-60, 2020 | 80 | 2020 |
DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization F Brasser, S Capkun, A Dmitrienko, T Frassetto, K Kostiainen, ... Proceedings of the 35th Annual Computer Security Applications Conference …, 2019 | 75 | 2019 |
Remote attestation for low-end embedded devices: the prover's perspective F Brasser, KB Rasmussen, AR Sadeghi, G Tsudik Proceedings of the 53rd Annual Design Automation Conference, 1-6, 2016 | 70 | 2016 |
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems. T Abera, R Bahmani, F Brasser, A Ibrahim, AR Sadeghi, M Schunter NDSS, 2019 | 69 | 2019 |
VoiceGuard: Secure and Private Speech Processing. F Brasser, T Frassetto, K Riedhammer, AR Sadeghi, T Schneider, ... Interspeech 18, 1303-1307, 2018 | 67 | 2018 |
Regulating arm trustzone devices in restricted spaces F Brasser, D Kim, C Liebchen, V Ganapathy, L Iftode, AR Sadeghi Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016 | 55 | 2016 |
State-aware anomaly detection for industrial control systems HR Ghaeini, D Antonioli, F Brasser, AR Sadeghi, NO Tippenhauer Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 1620-1628, 2018 | 50 | 2018 |