Patrick Jauernig
Patrick Jauernig
Verified email at - Homepage
Cited by
Cited by
NAUTILUS: Fishing for Deep Bugs with Grammars
C Aschermann, P Jauernig, T Frassetto, AR Sadeghi, T Holz, D Teuchert
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
SANCTUARY: ARMing TrustZone with User-space Enclaves
F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
FastKitten: Practical Smart Contracts on Bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX Security Symposium (USENIX Security 19), 2019
IMIX: In-Process Memory Isolation EXtension
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th USENIX Security Symposium (USENIX Security 18), 2018
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 2021
Trusted Execution Environments: Properties, Applications, and Challenges
P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (2), 56-60, 2020
Offline Model Guard: Secure and Private ML on Mobile Devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
23. Design, Automation and Test in Europe Conference (DATE '20), 2020
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
R Kande, A Crump, G Persyn, P Jauernig, AR Sadeghi, A Tyagi, ...
Cloud computing security: foundations and research directions
A Chakraborti, R Curtmola, J Katz, J Nieh, AR Sadeghi, R Sion, Y Zhang
Foundations and Trends® in Privacy and Security 3 (2), 103-213, 2022
In Hardware We Trust: Gains and Pains of Hardware-assisted Security
L Batina, P Jauernig, N Mentens, AR Sadeghi, E Stapf
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
Privacy-Preserving Speech Processing via STPC and TEEs
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64
T Cloosters, D Paaßen, J Wang, O Draissi, P Jauernig, E Stapf, L Davi, ...
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
Trusted Container Extensions for Container-based Confidential Computing
F Brasser, P Jauernig, F Pustelnik, AR Sadeghi, E Stapf
arXiv preprint arXiv:2205.05747, 2022
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
POSE: Practical off-chain smart contract execution
T Frassetto, P Jauernig, D Koisser, D Kretzler, B Schlosser, S Faust, ...
arXiv preprint arXiv:2210.07110, 2022
VirTEE: A full backward-compatible TEE with native live migration and secure I/O
J Wang, P Mahmoody, F Brasser, P Jauernig, AR Sadeghi, D Yu, D Pan, ...
Proceedings of the 59th ACM/IEEE Design Automation Conference, 241-246, 2022
CFINSIGHT: A Comprehensive Metric for CFI Policies
T Frassetto, P Jauernig, D Koisser, AR Sadeghi
{V'CER}: Efficient Certificate Validation in Constrained Networks
D Koisser, P Jauernig, G Tsudik, AR Sadeghi
31st USENIX Security Symposium (USENIX Security 22), 4491-4508, 2022
Method and apparatus for isolating sensitive untrusted program code on mobile device
E Stapf, P Jauernig, F Brasser, AR Sadeghi
US Patent App. 17/287,617, 2021
GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks
T Abera, F Brasser, L Gunn, P Jauernig, D Koisser, AR Sadeghi
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20