Skip to main content

Showing 1–7 of 7 results for author: Baumann, C

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.08127  [pdf, other

    cs.CR cs.PL

    Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust

    Authors: Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg

    Abstract: Rust is a popular memory-safe systems programming language. In order to interact with hardware or call into non-Rust libraries, Rust provides \emph{unsafe} language features that shift responsibility for ensuring memory safety to the developer. Failing to do so, may lead to memory safety violations in unsafe code which can violate safety of the entire application. In this work we explore in-proces… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  2. arXiv:2306.02131  [pdf, ps, other

    cs.CR cs.SE

    Exploring the Environmental Benefits of In-Process Isolation for Software Resilience

    Authors: Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg

    Abstract: Memory-related errors remain an important cause of software vulnerabilities. While mitigation techniques such as using memory-safe languages are promising solutions, these do not address software resilience and availability. In this paper, we propose a solution to build resilience against memory attacks into software, which contributes to environmental sustainability and security.

    Submitted 3 June, 2023; originally announced June 2023.

  3. End-to-End Security for Distributed Event-Driven Enclave Applications on Heterogeneous TEEs

    Authors: Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg

    Abstract: This paper presents an approach to provide strong assurance of the secure execution of distributed event-driven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon and extend security primitives provided by Trusted Execution Environments (TEEs) to guarantee authenticity and integrity properties of applications, and to secure control of input and o… ▽ More

    Submitted 29 June, 2023; v1 submitted 2 June, 2022; originally announced June 2022.

    Comments: 41 pages main text + 4 pages appendix, first co-authorship between Gianluca Scopelliti and Sepideh Pouyanrad, source code available at https://github.com/AuthenticExecution

    Journal ref: ACM Trans. Priv. Secur. 26, 3, Article 39 (August 2023), 46 pages (2023)

  4. arXiv:2205.03205  [pdf, other

    cs.CR

    Unlimited Lives: Secure In-Process Rollback with Isolated Domains

    Authors: Merve Gülmez, Thomas Nyman, Christoph Baumann, Jan Tobias Mühlberg

    Abstract: The use of unsafe programming languages still remains one of the major root causes of software vulnerabilities. Although well-known defenses that detect and mitigate memory-safety related issues exist, they don't address the challenge of software resilience, i.e., whether a system under attack can continue to carry out its function when subjected to malicious input. We propose secure rollback of i… ▽ More

    Submitted 21 April, 2023; v1 submitted 6 May, 2022; originally announced May 2022.

  5. Data-driven control of room temperature and bidirectional EV charging using deep reinforcement learning: simulations and experiments

    Authors: B. Svetozarevic, C. Baumann, S. Muntwiler, L. Di Natale, M. Zeilinger, P. Heer

    Abstract: This work presents a fully data-driven, black-box pipeline to obtain an optimal control policy for a multi-loop building control problem based on historical building and weather data, thus without the need for complex physics-based modelling. We demonstrate the method for joint control of room temperature and bidirectional EV charging to maximize the occupant thermal comfort and energy savings whi… ▽ More

    Submitted 17 June, 2021; v1 submitted 2 March, 2021; originally announced March 2021.

    Comments: 20 pages, 17 figures, 3 tables

  6. arXiv:2009.00508  [pdf, other

    cs.CV

    A High-Level Description and Performance Evaluation of Pupil Invisible

    Authors: Marc Tonsen, Chris Kay Baumann, Kai Dierkes

    Abstract: Head-mounted eye trackers promise convenient access to reliable gaze data in unconstrained environments. Due to several limitations, however, often they can only partially deliver on this promise. Among those are the following: (i) the necessity of performing a device setup and calibration prior to every use of the eye tracker, (ii) a lack of robustness of gaze-estimation results against perturb… ▽ More

    Submitted 1 September, 2020; originally announced September 2020.

  7. Lessons Learned From Microkernel Verification -- Specification is the New Bottleneck

    Authors: Christoph Baumann, Bernhard Beckert, Holger Blasum, Thorsten Bormer

    Abstract: Software verification tools have become a lot more powerful in recent years. Even verification of large, complex systems is feasible, as demonstrated in the L4.verified and Verisoft XT projects. Still, functional verification of large software systems is rare - for reasons beyond the large scale of verification effort needed due to the size alone. In this paper we report on lessons learned for… ▽ More

    Submitted 26 November, 2012; originally announced November 2012.

    Comments: In Proceedings SSV 2012, arXiv:1211.5873

    Journal ref: EPTCS 102, 2012, pp. 18-32