Seguir
Shweta Shinde
Shweta Shinde
Assistant Professor, ETH Zurich
Dirección de correo verificada de inf.ethz.ch - Página principal
Título
Citado por
Citado por
Año
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 969-986, 2016
3552016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
244*2016
Panoply: Low-TCB Linux Applications with SGX Enclaves
S Shinde, D Le Tien, S Tople, P Saxena
Proceedings of the 24th Annual Network and Distributed System Security …, 2016
2392016
Keystone: An open framework for architecting trusted execution environments
D Lee, D Kohlbrenner, S Shinde, K Asanović, D Song
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
236*2020
A model counter for constraints over unbounded strings
L Luu, S Shinde, P Saxena, B Demsky
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
662014
Privado: Practical and secure DNN inference with enclaves
K Grover, S Tople, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
53*2018
Quantitative Verification of Neural Networks And its Security Applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 26th ACM Conference on Computer and Communications …, 2019
492019
DexterJS: robust testing platform for DOM-based XSS vulnerabilities
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
352015
Auto-patching DOM-based XSS at scale
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
312015
AutoCrypt: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
312013
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints
S Shiqi, S Shinde, S Ramesh, A Roychoudhury, P Saxena
Proceedings of the 26th Annual Network and Distributed System Security …, 2018
252018
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
Proceedings of the 29th USENIX Security Symposium, 2020, 2019
19*2019
Practical Verifiable In-network Filtering for DDoS defense
D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
192019
PodArch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
152015
Elasticlave: An Efficient Memory Model for Enclaves
JZ Yu, S Shinde, TE Carlson, P Saxena
31st USENIX Security Symposium (USENIX Security 22), 2022
42022
SmashEx: Smashing SGX Enclaves Using Exceptions
J Cui, JZ Yu, S Shinde, P Saxena, Z Cai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
32021
Dynamic Binary Translation for SGX Enclaves
J Cui, S Shinde, S Sen, P Saxena, P Yuan
arXiv preprint arXiv:2103.15289, 2021
3*2021
Building Open Trusted Execution Environments
D Kohlbrenner, S Shinde, D Lee, K Asanovic, D Song
IEEE Security & Privacy 18 (5), 47-56, 2020
22020
SBC 21 workshop welcome message
J Liu, S Shinde
SBC 2021-Proceedings of the 9th International Workshop on Security in …, 2021
2021
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
F Groschupp, M Schneider, I Puddu, S Shinde, S Capkun
arXiv preprint arXiv:2102.02743, 2021
2021
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20