Zobrazeno 1 - 10
of 4 319
pro vyhledávání: '"Eisenbarth, A."'
The cloud computing landscape has evolved significantly in recent years, embracing various sandboxes to meet the diverse demands of modern cloud applications. These sandboxes encompass container-based technologies like Docker and gVisor, microVM-base
Externí odkaz:
http://arxiv.org/abs/2404.10715
Autor:
Schmitz, Philipp, Jauch, Tobias, Wezel, Alex, Fadiheh, Mohammad R., Tiemann, Thore, Heller, Jonah, Eisenbarth, Thomas, Stoffel, Dominik, Kunz, Wolfgang
This paper introduces Okapi, a new hardware/software cross-layer architecture designed to mitigate Transient Execution Side Channel (TES) attacks in modern computing systems. Okapi enforces sandboxing for speculative execution, providing a hardware b
Externí odkaz:
http://arxiv.org/abs/2312.08156
Autor:
Nešković, Andrija, Mulhem, Saleh, Treff, Alexander, Buchty, Rainer, Eisenbarth, Thomas, Berekovic, Mladen
As training artificial intelligence (AI) models is a lengthy and hence costly process, leakage of such a model's internal parameters is highly undesirable. In the case of AI accelerators, side-channel information leakage opens up the threat scenario
Externí odkaz:
http://arxiv.org/abs/2311.13387
Autor:
Michael J. Caplan, Richard Baldwin, Xiangyun Yin, Alexander Grishin, Stephanie Eisenbarth, Hugh A. Sampson, Kim Bottomly, Robert K. Prud’homme
Publikováno v:
Communications Materials, Vol 5, Iss 1, Pp 1-11 (2024)
Abstract Immune modulation and desensitization is a growing field of research and clinical investigation that requires precise delivery of antigens to immune system cells. Nanoparticles (NPs) have emerged as excellent candidates for antigen delivery,
Externí odkaz:
https://doaj.org/article/70ea25fc008b413291803f7ea6e74b35
The ever increasing popularity and availability of Trusted Execution Environments (TEEs) had a stark influence on microarchitectural attack research in academia, as their strong attacker model both boosts existing attack vectors and introduces severa
Externí odkaz:
http://arxiv.org/abs/2307.14757
WebAssembly (Wasm) is a low-level binary format for web applications, which has found widespread adoption due to its improved performance and compatibility with existing software. However, the popularity of Wasm has also led to its exploitation for m
Externí odkaz:
http://arxiv.org/abs/2305.02559
Publikováno v:
Detection of Intrusions and Malware, and Vulnerability Assessment- 20th International Conference, DIMVA 2023
RISC-V is an emerging technology, with applications ranging from embedded devices to high-performance servers. Therefore, more and more security-critical workloads will be conducted with code that is compiled for RISC-V. Well-known microarchitectural
Externí odkaz:
http://arxiv.org/abs/2305.00584
Autor:
L. K. Metthew Lam, Emily Oatman, Kaitlyn A. Eckart, Nathan J. Klingensmith, Emily Flowers, Layal Sayegh, Julia Yuen, Rebecca L. Clements, Nuala J. Meyer, Kellie A. Jurado, Andrew E. Vaughan, Stephanie C. Eisenbarth, Nilam S. Mangalmurti
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-10 (2024)
Abstract Red blood cells (RBCs) express the nucleic acid-binding toll-like receptor 9 (TLR9) and bind CpG-containing DNA. However, whether human RBCs express other nucleic acid-binding TLRs is unknown. Here we show that human RBCs express the RNA sen
Externí odkaz:
https://doaj.org/article/afd7120448ec4e1f9581ca8408fd6e8a
The adoption of machine learning solutions is rapidly increasing across all parts of society. As the models grow larger, both training and inference of machine learning models is increasingly outsourced, e.g. to cloud service providers. This means th
Externí odkaz:
http://arxiv.org/abs/2302.06361
Publikováno v:
32nd USENIX Security Symposium, USENIX Security 2023
Trusted execution environments (TEEs) provide an environment for running workloads in the cloud without having to trust cloud service providers, by offering additional hardware-assisted security guarantees. However, main memory encryption as a key me
Externí odkaz:
http://arxiv.org/abs/2210.13124