Skip to main content

Showing 1–6 of 6 results for author: Kuhne, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.03387  [pdf, other

    cs.CR

    Heckler: Breaking Confidential VMs with Malicious Interrupts

    Authors: Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde

    Abstract: Hardware-based Trusted execution environments (TEEs) offer an isolation granularity of virtual machine abstraction. They provide confidential VMs (CVMs) that host security-sensitive code and data. AMD SEV-SNP and Intel TDX enable CVMs and are now available on popular cloud platforms. The untrusted hypervisor in these settings is in control of several resource management and configuration tasks, in… ▽ More

    Submitted 4 April, 2024; originally announced April 2024.

    Comments: Extended version of the Usenix Security 2024 paper

  2. arXiv:2305.15986  [pdf, other

    cs.CR

    ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture

    Authors: Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde

    Abstract: Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as GPUs and FPGAs. In this paper, we reconsider the Arm Confidential Computing Architecture (CCA) design, an upcoming TEE feature in Armv9-A, to address this gap. We observe that CCA offers the right abstraction a… ▽ More

    Submitted 25 October, 2023; v1 submitted 25 May, 2023; originally announced May 2023.

    Comments: Extended version of the Usenix Security 2024 paper

  3. arXiv:2211.05206  [pdf, other

    cs.CR

    It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones

    Authors: Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun

    Abstract: Modern smartphones are complex systems in which control over phone resources is exercised by phone manufacturers, OS vendors, and users. These stakeholders have diverse and often competing interests. Barring some exceptions, users entrust their security and privacy to OS vendors (Android and iOS) and need to accept their constraints. Manufacturers protect their firmware and peripherals from the OS… ▽ More

    Submitted 28 June, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

  4. arXiv:2012.12041  [pdf

    cs.HC

    WestDrive X LoopAR: An open-access virtual reality project in Unity for evaluating user interaction methods during TOR

    Authors: Farbod N. Nezami, Maximilian A. Wächter, Nora Maleki, Philipp Spaniol, Lea M. Kühne, Anke Haas, Johannes M. **el, Linus Tiemann, Frederik Nienhaus, Lynn Keller, Sabine König, Peter König, Gordon Pipa

    Abstract: With the further development of highly automated vehicles, drivers will engage in non-related tasks while being driven. Still, drivers have to take over control when requested by the car. Here the question arises, how potentially distracted drivers get back into the control-loop quickly and safely when the car requests a takeover. To investigate effective human-machine interactions in mobile, vers… ▽ More

    Submitted 22 December, 2020; originally announced December 2020.

  5. arXiv:2002.04608  [pdf, other

    cs.CL cs.IR cs.LG

    Constructing a Highlight Classifier with an Attention Based LSTM Neural Network

    Authors: Michael Kuehne, Marius Radu

    Abstract: Data is being produced in larger quantities than ever before in human history. It's only natural to expect a rise in demand for technology that aids humans in sifting through and analyzing this inexhaustible supply of information. This need exists in the market research industry, where large amounts of consumer research data is collected through video recordings. At present, the standard method fo… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

    Comments: 14 pages, 8 figures

  6. arXiv:0904.1299  [pdf, ps, other

    cs.DL cs.IR physics.comp-ph physics.ins-det

    On the Communication of Scientific Results: The Full-Metadata Format

    Authors: Moritz Riede, Rico Schueppel, Kristian O. Sylvester-Hvid, Martin Kuehne, Michael C. Roettger, Klaus Zimmermann, Andreas W. Liehr

    Abstract: In this paper, we introduce a scientific format for text-based data files, which facilitates storing and communicating tabular data sets. The so-called Full-Metadata Format builds on the widely used INI-standard and is based on four principles: readable self-documentation, flexible structure, fail-safe compatibility, and searchability. As a consequence, all metadata required to interpret the tab… ▽ More

    Submitted 8 April, 2009; originally announced April 2009.

    Report number: SI20090302a

    Journal ref: Comput.Phys.Commun.181:651-662,2010