Publications associées (38)

A RISC-V Extension to Minimize Privileges of Enclave Runtimes

Edouard Bugnion, Neelu Shivprakash Kalani

In confidential computing, the view of the system software is Manichean: the host operating system is untrusted and the TEE runtime system is fully trusted. However, the runtime system is often as complex as a full operating system, and thus is not free fr ...
ACM2023

TEEzz: Fuzzing Trusted Applications on COTS Android Devices

Mathias Josef Payer, Marcel Busch

Security and privacy-sensitive smartphone applications use trusted execution environments (TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged access to the entire system but expose little to no insight into their inn ...
IEEE COMPUTER SOC2023

Maneuvering the odds: The dynamics of venture capital decision-making

Marc Gruber

Research Summary: This article investigates venture capital (VC) decision-making, a process that occurs under changing conditions and limited, ambiguous information. We shed new light on the inherent dynamics of this strategic process. One of the key disti ...
WILEY2023

Attestable Software Versioning for Stateful Confidential Computing

Edouard Bugnion, Charly Nicolas Lucien Castes

Trusted execution environments enable the creation of confidential and attestable enclaves that exclude the platform and service providers from the trusted base. From its initial attestable state, a stateful enclave such as a confidential database can hold ...
2022

DARKFLUX: A new tool to analyze indirect-detection spectra of next-generation dark matter models

We present DARKFLUX, a software tool designed to analyze indirect-detection signatures for next-generation models of dark matter (DM) with multiple annihilation channels. Version 1.0 of this tool accepts user-generated models with 2 -> 2 tree-level dark ma ...
ELSEVIER2022

mu RAI: Securing Embedded Systems with Return Address Integrity

Mathias Josef Payer

Embedded systems are deployed in security critical environments and have become a prominent target for remote attacks. Microcontroller-based systems (MCUS) are particularly vulnerable due to a combination of limited resources and low level programming whic ...
INTERNET SOC2020

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.