Shweta Shinde
Shweta Shinde
Assistant Professor, ETH Zurich
Email verificata su inf.ethz.ch - Home page
Titolo
Citata da
Citata da
Anno
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 969-986, 2016
2282016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
178*2016
Panoply: Low-TCB Linux Applications with SGX Enclaves
S Shinde, D Le Tien, S Tople, P Saxena
Proceedings of the 24th Annual Network and Distributed System Security …, 2016
1582016
A model counter for constraints over unbounded strings
L Luu, S Shinde, P Saxena, B Demsky
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
512014
Keystone: An open framework for architecting trusted execution environments
D Lee, D Kohlbrenner, S Shinde, K Asanović, D Song
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
47*2020
DexterJS: robust testing platform for DOM-based XSS vulnerabilities
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
282015
Auto-patching DOM-based XSS at scale
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
252015
Privado: Practical and Secure DNN Inference with Enclaves
K Grover, S Tople, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
23*2018
AutoCrypt: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
222013
Quantitative Verification of Neural Networks And its Security Applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 26th ACM Conference on Computer and Communications …, 2019
182019
Keystone: An open framework for architecting tees
D Lee, D Kohlbrenner, S Shinde, D Song, K Asanovic
arXiv preprint arXiv:1907.10119, 2019
162019
PodArch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
142015
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints
S Shiqi, S Shinde, S Ramesh, A Roychoudhury, P Saxena
Proceedings of the 26th Annual Network and Distributed System Security …, 2018
102018
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
Proceedings of the 29th USENIX Security Symposium, 2020, 2019
82019
Practical Verifiable In-network Filtering for DDoS defense
D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
42019
Binary Compatibility For SGX Enclaves
S Shinde, J Cui, S Sen, P Yuan, P Saxena
arXiv preprint arXiv:2009.01144, 2020
2020
Building Open Trusted Execution Environments
D Kohlbrenner, S Shinde, D Lee, K Asanovic, D Song
IEEE Security & Privacy, 2020
2020
Securing Applications From Untrusted Operating Systems Using Enclaves
S SHINDE
National University of Singapore, 2018
2018
Poster: PodArch: Protecting Legacy Applications with a Purely Hardware TCB
S Shinde, S Tople, D Kathayat, P Saxena
36th IEEE Symposium on Security and Privacy, 2015
2015
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–19