Skip to main content

Showing 1–7 of 7 results for author: Stapf, E

Searching in archive cs. Search in all archives.
.
  1. DARWIN: Survival of the Fittest Fuzzing Mutators

    Authors: Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi

    Abstract: Fuzzing is an automated software testing technique broadly adopted by the industry. A popular variant is mutation-based fuzzing, which discovers a large number of bugs in practice. While the research community has studied mutation-based fuzzing for years now, the algorithms' interactions within the fuzzer are highly complex and can, together with the randomness in every instance of a fuzzer, lead… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Journal ref: Annual Network and Distributed System Security Symposium, NDSS, 2023

  2. arXiv:2205.05747  [pdf, other

    cs.CR

    Trusted Container Extensions for Container-based Confidential Computing

    Authors: Ferdinand Brasser, Patrick Jauernig, Frederik Pustelnik, Ahmad-Reza Sadeghi, Emmanuel Stapf

    Abstract: Cloud computing has emerged as a corner stone of today's computing landscape. More and more customers who outsource their infrastructure benefit from the manageability, scalability and cost saving that come with cloud computing. Those benefits get amplified by the trend towards microservices. Instead of renting and maintaining full VMs, customers increasingly leverage container technologies, which… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

  3. arXiv:2110.08139  [pdf, other

    cs.CR

    Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures

    Authors: Ghada Dessouky, Alexander Gruler, Pouya Mahmoody, Ahmad-Reza Sadeghi, Emmanuel Stapf

    Abstract: Shared cache resources in multi-core processors are vulnerable to cache side-channel attacks. Recently proposed defenses have their own caveats: Randomization-based defenses are vulnerable to the evolving attack algorithms besides relying on weak cryptographic primitives, because they do not fundamentally address the root cause for cache side-channel attacks. Cache partitioning defenses, on the ot… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

    Comments: Accepted on 3 Sept 2021 to appear at the Network and Distributed System Security Symposium (NDSS) 2022

  4. arXiv:2010.15866  [pdf, other

    cs.CR

    CURE: A Security Architecture with CUstomizable and Resilient Enclaves

    Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf

    Abstract: Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from low-end embedded devices to powerful cloud servers. The goal of these architectures is to protect sensitive services in isolated execution contexts, called enclaves. Unfortunately, existing TEE solutions suffer from significant design shortcoming… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: Accepted to be published in the proceedings of the 30th USENIX Security Symposium (USENIX Security '21 )

  5. arXiv:2008.04449  [pdf, ps, other

    cs.CR cs.AI cs.AR cs.CY cs.LG

    Trustworthy AI Inference Systems: An Industry Research View

    Authors: Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Joshua Stock, Huili Chen, Siam Umar Hussain, Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajan Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu , et al. (4 additional authors not shown)

    Abstract: In this work, we provide an industry research view for approaching the design, deployment, and operation of trustworthy Artificial Intelligence (AI) inference systems. Such systems provide customers with timely, informed, and customized inferences to aid their decision, while at the same time utilizing appropriate security protection mechanisms for AI models. Additionally, such systems should also… ▽ More

    Submitted 10 February, 2023; v1 submitted 10 August, 2020; originally announced August 2020.

  6. Offline Model Guard: Secure and Private ML on Mobile Devices

    Authors: Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert

    Abstract: Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data) should remain private while also the intellectual property of service providers (e.g., model parameters) must be protected. Cryptographic techniques offer secure solutions for this, but have an unacceptable overhead and moreover require frequen… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Original Publication (in the same form): DATE 2020

    Journal ref: DATE 2020, pages 460-465

  7. arXiv:1808.06453  [pdf, other

    cs.NI cs.LG

    Towards Fine Grained Network Flow Prediction

    Authors: Patrick Jahnke, Emmanuel Stapf, Jonas Mieseler, Gerhard Neumann, Patrick Eugster

    Abstract: One main challenge for the design of networks is that traffic load is not generally known in advance. This makes it hard to adequately devote resources such as to best prevent or mitigate bottlenecks. While several authors have shown how to predict traffic in a coarse grained manner by aggregating flows, fine grained prediction of traffic at the level of individual flows, including bursty traffic,… ▽ More

    Submitted 20 August, 2018; originally announced August 2018.