Zobrazeno 1 - 10
of 789
pro vyhledávání: '"Ménétrey, A."'
Autor:
Mwaisela, Mpoki, Hari, Joel, Yuhala, Peterson, Ménétrey, Jämes, Felber, Pascal, Schiavoni, Valerio
The widespread adoption of cloud-based solutions introduces privacy and security concerns. Techniques such as homomorphic encryption (HE) mitigate this problem by allowing computation over encrypted data without the need for decryption. However, the
Externí odkaz:
http://arxiv.org/abs/2412.09144
Publikováno v:
Stabilization, Safety, and Security of Distributed Systems. SSS 2024. Lecture Notes in Computer Science, vol 14931. Springer, Cham
Using cloud-based applications comes with privacy implications, as the end-user looses control over their data. While encrypting all data on the client is possible, it largely reduces the usefulness of database management systems (DBMS) that are typi
Externí odkaz:
http://arxiv.org/abs/2411.02084
Autor:
Ménétrey, Jämes, Pasin, Marcelo, Felber, Pascal, Schiavoni, Valerio, Mazzeo, Giovanni, Hollum, Arne, Vaydia, Darshan
Publikováno v:
TDSC: IEEE Transactions on Dependable and Secure Computing, November, 2023
In real-world scenarios, trusted execution environments (TEEs) frequently host applications that lack the trust of the infrastructure provider, as well as data owners who have specifically outsourced their data for remote processing. We present Twine
Externí odkaz:
http://arxiv.org/abs/2312.09087
With the increasing popularity of Internet of Things (IoT) devices, securing sensitive user data has emerged as a major challenge. These devices often collect confidential information, such as audio and visual data, through peripheral inputs like mic
Externí odkaz:
http://arxiv.org/abs/2312.02542
Autor:
Ménétrey, Jämes, Grüter, Aeneas, Yuhala, Peterson, Oeftiger, Julius, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio
Publikováno v:
OPODIS'23: Proceedings of the 27th Conference on Principles of Distributed Systems, Tokyo, Japan, December 2023
Publish/subscribe systems play a key role in enabling communication between numerous devices in distributed and large-scale architectures. While widely adopted, securing such systems often trades portability for additional integrity and attestation g
Externí odkaz:
http://arxiv.org/abs/2312.00702
Electrohydrodynamic 3D printing is an additive manufacturing technique with enormous potential in plasmonics, microelectronics, and sensing applications, thanks to its broad materials palette, high voxel deposition rate, and compatibility with variou
Externí odkaz:
http://arxiv.org/abs/2308.08323
Autor:
Gerig, Pascal, Ménétrey, Jämes, Lanoix, Baptiste, Stoller, Florian, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio
Publikováno v:
DEBS'23: Proceedings of the 17th ACM International Conference on Distributed and Event-Based Systems, Neuch\^atel, Switzerland, June 2023
Traditional email encryption schemes are vulnerable to EFail attacks, which exploit the lack of message authentication by manipulating ciphertexts and exfiltrating plaintext via HTML backchannels. Swiss Post's IncaMail, a secure email service for tra
Externí odkaz:
http://arxiv.org/abs/2306.13388
Autor:
Mika, Kevin, Griessl, René, Kucza, Nils, Porrmann, Florian, Kaiser, Martin, Tigges, Lennart, Hagemeyer, Jens, Trancoso, Pedro, Azhar, Muhammad Waqar, Qararyah, Fareed, Zouzoula, Stavroula, Ménétrey, Jämes, Pasin, Marcelo, Felber, Pascal, Marcus, Carina, Brunnegard, Oliver, Eriksson, Olof, Salomonsson, Hans, Ödman, Daniel, Ask, Andreas, Casimiro, Antonio, Bessani, Alysson, Carvalho, Tiago, Gugala, Karol, Zierhoffer, Piotr, Latosinski, Grzegorz, Tassemeier, Marco, Porrmann, Mario, Heyn, Hans-Martin, Knauss, Eric, Mao, Yufei, Meierhöfer, Franz
Publikováno v:
CF'23: 20th ACM International Conference on Computing Frontiers, May 2023, Bologna, Italy
The VEDLIoT project aims to develop energy-efficient Deep Learning methodologies for distributed Artificial Intelligence of Things (AIoT) applications. During our project, we propose a holistic approach that focuses on optimizing algorithms while add
Externí odkaz:
http://arxiv.org/abs/2305.05388
Autor:
Yuhala, Peterson, Ménétrey, Jämes, Felber, Pascal, Schiavoni, Valerio, Tchana, Alain, Thomas, Gaël, Guiroux, Hugo, Lozi, Jean-Pierre
The popularity of the Java programming language has led to its wide adoption in cloud computing infrastructures. However, Java applications running in untrusted clouds are vulnerable to various forms of privileged attacks. The emergence of trusted ex
Externí odkaz:
http://arxiv.org/abs/2305.00766
Autor:
Kaiser, Martin, Griessl, Rene, Kucza, Nils, Haumann, Carola, Tigges, Lennart, Mika, Kevin, Hagemeyer, Jens, Porrmann, Florian, Rückert, Ulrich, dem Berge, Micha vor, Krupop, Stefan., Porrmann, Mario, Tassemeier, Marco, Trancoso, Pedro, Quararyah, Fareed, Zouzoula, Stavroula, Casimiro, Antonio, Bessani, Alysson, Cecilio, Jose, Andersson, Stefan, Brunnegard, Oliver, Eriksson, Olof, Weiss, Roland, Meierhöfer, Franz, Salomonsson, Hans, Malekzadeh, Elaheh, Ödman, Daniel, Khurshid, Anum, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio, Ménétrey, Jämes, Gugula, Karol, Zierhoffer, Piotr, Knauss, Eric, Heyn, Hans-Martin
Publikováno v:
DATE'22: Proceedings of the 25th Conference & Exhibition on Design, Automation & Test in Europe, March 2022, pp. 963-968
The VEDLIoT project targets the development of energy-efficient Deep Learning for distributed AIoT applications. A holistic approach is used to optimize algorithms while also dealing with safety and security challenges. The approach is based on a mod
Externí odkaz:
http://arxiv.org/abs/2207.00675