AC-LoRA: (Almost) Training-Free Access Control-Aware Multi-Modal LLMs.
CoRR, May, 2025
Guardain: Protecting Emerging Generative AI Workloads on Heterogeneous NPU.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads.
CoRR, 2024
Confidential Computing with Heterogeneous Devices at Cloud-Scale.
Proceedings of the Annual Computer Security Applications Conference, 2024
Composite Enclaves: Towards Disaggregated Trusted Execution.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Empowering Data Centers for Next Generation Trusted Computing.
CoRR, 2022
Building Trust in Modern Computing Platforms.
PhD thesis, 2021
Dedicated Security Chips in the Age of Secure Enclaves.
IEEE Secur. Priv., 2020
IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients.
CoRR, 2020
PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment.
CoRR, 2020
Snappy: Fast On-chain Payments with Practical Collaterals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
ProximiTEE: Hardened SGX Attestation by Proximity Verification.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
IACR Cryptol. ePrint Arch., 2019
Deniable Upload and Download via Passive Participation.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019
Development of UAV Based Glacial Lake Outburst Monitoring System.
,
,
,
,
,
,
,
,
,
,
Proceedings of the 2019 IEEE International Geoscience and Remote Sensing Symposium, 2019
ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptol. ePrint Arch., 2018
METIS: Resource and Context-Aware Monitoring of Finite State Properties.
Proceedings of the Runtime Verification - 18th International Conference, 2018
CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks.
IACR Cryptol. ePrint Arch., 2017
ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017
IntegriKey: End-to-End Integrity Protection of User Input.
IACR Cryptol. ePrint Arch., 2017
Privacy-preserving Targeted Advertising.
CoRR, 2017
TactBack: VibroTactile braille output using smartphone and smartwatch for visually impaired.
Proceedings of the 13th Web for All Conference, 2016
CLOTHO: saving programs from malformed strings and incorrect string-handling.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015
Increasing Anonymity in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2014
Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013
Code Based KPD Scheme with Full Connectivity: Deterministic Merging.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks.
Proceedings of the Information Security - 15th International Conference, 2012