Zobrazeno 1 - 10
of 1 761
pro vyhledávání: '"Kuhne, P."'
TEE implementations on RISC-V offer an enclave abstraction by introducing a trusted component called the security monitor (SM). The SM performs critical tasks such as isolating enclaves from each other as well as from the OS by using privileged ISA i
Externí odkaz:
http://arxiv.org/abs/2410.03653
Autor:
Bertschi, Andrin, Sridhara, Supraja, Groschupp, Friederike, Kuhne, Mark, Schlüter, Benedict, Thorens, Clément, Dutly, Nicolas, Capkun, Srdjan, Shinde, Shweta
Arm Confidential Computing Architecture (CCA) executes sensitive computation in an abstraction called realm VMs and protects it from the hypervisor, host OS, and other co-resident VMs. However, CCA does not allow integrated devices on the platform to
Externí odkaz:
http://arxiv.org/abs/2408.05835
Autor:
Kuhne, Mark, Sridhara, Supraja, Bertschi, Andrin, Dutly, Nicolas, Capkun, Srdjan, Shinde, Shweta
The Android ecosystem relies on either TrustZone (e.g., OP-TEE, QTEE, Trusty) or trusted hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and Android bugs. TrustZone allows any secure world code to access the norm
Externí odkaz:
http://arxiv.org/abs/2407.16694
Hardware-based Trusted execution environments (TEEs) offer an isolation granularity of virtual machine abstraction. They provide confidential VMs (CVMs) that host security-sensitive code and data. AMD SEV-SNP and Intel TDX enable CVMs and are now ava
Externí odkaz:
http://arxiv.org/abs/2404.03387
Autor:
Xie, Fengze, Dominguez-Kuhne, Marcus, Riviere, Benjamin, Song, Jialin, Hönig, Wolfgang, Chung, Soon-Jo, Yue, Yisong
In this paper, we present a method of multi-robot motion planning by biasing centralized, sampling-based tree search with decentralized, data-driven steer and distance heuristics. Over a range of robot and obstacle densities, we evaluate the plain Ra
Externí odkaz:
http://arxiv.org/abs/2311.12385
Autor:
Woodcock, Jim, Andersen, Mikkel Schmidt, Aranha, Diego F., Hallerstede, Stefan, Hansen, Simon Thrane, Jakobsen, Nikolaj Kuhne, Kulik, Tomas, Larsen, Peter Gorm, Macedo, Hugo Daniel, Martin, Carlos Ignacio Isasa, Norrild, Victor Alexander Mtsimbe
This report describes the state of the art in verifiable computation. The problem being solved is the following: The Verifiable Computation Problem (Verifiable Computing Problem) Suppose we have two computing agents. The first agent is the verifier,
Externí odkaz:
http://arxiv.org/abs/2308.15191
Autor:
Sridhara, Supraja, Bertschi, Andrin, Schlüter, Benedict, Kuhne, Mark, Aliberti, Fabio, Shinde, Shweta
Trusted execution environments in several existing and upcoming CPUs demonstrate the success of confidential computing, with the caveat that tenants cannot securely use accelerators such as GPUs and FPGAs. In this paper, we reconsider the Arm Confide
Externí odkaz:
http://arxiv.org/abs/2305.15986
Publikováno v:
Ecological Indicators, Vol 168, Iss , Pp 112783- (2024)
Disentangling the effects of environmental variation and management actions on vegetation condition is increasingly important given increasing efforts to tackle biodiversity loss and the advent of environmental accounting programs. The Mount Lofty Ra
Externí odkaz:
https://doaj.org/article/51ace42a4d844e499aceb05827a7805c
Autor:
Blanka Pophof, Jens Kuhne, Gernot Schmid, Evelyn Weiser, Hans Dorn, Bernd Henschenmacher, Jacob Burns, Heidi Danker-Hopfe, Cornelia Sauter
Publikováno v:
Environment International, Vol 191, Iss , Pp 108899- (2024)
Background: The objective of this review is to evaluate the associations between short-term exposure to radiofrequency electromagnetic fields (RF-EMF) and cognitive performance in human experimental studies. Methods: Online databases (PubMed, Embase,
Externí odkaz:
https://doaj.org/article/d1001d2cc0384c8199051596d74aec8c
Autor:
Groschupp, Friederike, Kuhne, Mark, Schneider, Moritz, Puddu, Ivan, Shinde, Shweta, Capkun, Srdjan
Modern smartphones are complex systems in which control over phone resources is exercised by phone manufacturers, OS vendors, and users. These stakeholders have diverse and often competing interests. Barring some exceptions, users entrust their secur
Externí odkaz:
http://arxiv.org/abs/2211.05206