Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Ménétrey, Jämes"'
Autor:
Ménétrey, Jämes, Pasin, Marcelo, Felber, Pascal, Schiavoni, Valerio, Mazzeo, Giovanni, Hollum, Arne, Vaydia, Darshan
Publikováno v:
TDSC: IEEE Transactions on Dependable and Secure Computing, November, 2023
In real-world scenarios, trusted execution environments (TEEs) frequently host applications that lack the trust of the infrastructure provider, as well as data owners who have specifically outsourced their data for remote processing. We present Twine
Externí odkaz:
http://arxiv.org/abs/2312.09087
With the increasing popularity of Internet of Things (IoT) devices, securing sensitive user data has emerged as a major challenge. These devices often collect confidential information, such as audio and visual data, through peripheral inputs like mic
Externí odkaz:
http://arxiv.org/abs/2312.02542
Autor:
Ménétrey, Jämes, Grüter, Aeneas, Yuhala, Peterson, Oeftiger, Julius, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio
Publikováno v:
OPODIS'23: Proceedings of the 27th Conference on Principles of Distributed Systems, Tokyo, Japan, December 2023
Publish/subscribe systems play a key role in enabling communication between numerous devices in distributed and large-scale architectures. While widely adopted, securing such systems often trades portability for additional integrity and attestation g
Externí odkaz:
http://arxiv.org/abs/2312.00702
Autor:
Gerig, Pascal, Ménétrey, Jämes, Lanoix, Baptiste, Stoller, Florian, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio
Publikováno v:
DEBS'23: Proceedings of the 17th ACM International Conference on Distributed and Event-Based Systems, Neuch\^atel, Switzerland, June 2023
Traditional email encryption schemes are vulnerable to EFail attacks, which exploit the lack of message authentication by manipulating ciphertexts and exfiltrating plaintext via HTML backchannels. Swiss Post's IncaMail, a secure email service for tra
Externí odkaz:
http://arxiv.org/abs/2306.13388
Autor:
Mika, Kevin, Griessl, René, Kucza, Nils, Porrmann, Florian, Kaiser, Martin, Tigges, Lennart, Hagemeyer, Jens, Trancoso, Pedro, Azhar, Muhammad Waqar, Qararyah, Fareed, Zouzoula, Stavroula, Ménétrey, Jämes, Pasin, Marcelo, Felber, Pascal, Marcus, Carina, Brunnegard, Oliver, Eriksson, Olof, Salomonsson, Hans, Ödman, Daniel, Ask, Andreas, Casimiro, Antonio, Bessani, Alysson, Carvalho, Tiago, Gugala, Karol, Zierhoffer, Piotr, Latosinski, Grzegorz, Tassemeier, Marco, Porrmann, Mario, Heyn, Hans-Martin, Knauss, Eric, Mao, Yufei, Meierhöfer, Franz
Publikováno v:
CF'23: 20th ACM International Conference on Computing Frontiers, May 2023, Bologna, Italy
The VEDLIoT project aims to develop energy-efficient Deep Learning methodologies for distributed Artificial Intelligence of Things (AIoT) applications. During our project, we propose a holistic approach that focuses on optimizing algorithms while add
Externí odkaz:
http://arxiv.org/abs/2305.05388
Autor:
Yuhala, Peterson, Ménétrey, Jämes, Felber, Pascal, Schiavoni, Valerio, Tchana, Alain, Thomas, Gaël, Guiroux, Hugo, Lozi, Jean-Pierre
The popularity of the Java programming language has led to its wide adoption in cloud computing infrastructures. However, Java applications running in untrusted clouds are vulnerable to various forms of privileged attacks. The emergence of trusted ex
Externí odkaz:
http://arxiv.org/abs/2305.00766
Autor:
Kaiser, Martin, Griessl, Rene, Kucza, Nils, Haumann, Carola, Tigges, Lennart, Mika, Kevin, Hagemeyer, Jens, Porrmann, Florian, Rückert, Ulrich, dem Berge, Micha vor, Krupop, Stefan., Porrmann, Mario, Tassemeier, Marco, Trancoso, Pedro, Quararyah, Fareed, Zouzoula, Stavroula, Casimiro, Antonio, Bessani, Alysson, Cecilio, Jose, Andersson, Stefan, Brunnegard, Oliver, Eriksson, Olof, Weiss, Roland, Meierhöfer, Franz, Salomonsson, Hans, Malekzadeh, Elaheh, Ödman, Daniel, Khurshid, Anum, Felber, Pascal, Pasin, Marcelo, Schiavoni, Valerio, Ménétrey, Jämes, Gugula, Karol, Zierhoffer, Piotr, Knauss, Eric, Heyn, Hans-Martin
Publikováno v:
DATE'22: Proceedings of the 25th Conference & Exhibition on Design, Automation & Test in Europe, March 2022, pp. 963-968
The VEDLIoT project targets the development of energy-efficient Deep Learning for distributed AIoT applications. A holistic approach is used to optimize algorithms while also dealing with safety and security challenges. The approach is based on a mod
Externí odkaz:
http://arxiv.org/abs/2207.00675
Publikováno v:
FRAME'22: Proceedings of the 2nd Workshop on Flexible Resource and Application Management on the Edge, co-located with HPDC'22, July 2022, pp. 3-8
Over the last decade, the cloud computing landscape has transformed from a centralised architecture made of large data centres to a distributed and heterogeneous architecture embracing edge and IoT units. This shift has created the so-called cloud-ed
Externí odkaz:
http://arxiv.org/abs/2206.12888
Publikováno v:
ICDCS'22: Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, July 2022
WebAssembly (Wasm) is a novel low-level bytecode format that swiftly gained popularity for its efficiency, versatility and security, with near-native performance. Besides, trusted execution environments (TEEs) shield critical software assets against
Externí odkaz:
http://arxiv.org/abs/2206.08722
Autor:
Ménétrey, Jämes, Göttel, Christian, Khurshid, Anum, Pasin, Marcelo, Felber, Pascal, Schiavoni, Valerio, Raza, Shahid
Publikováno v:
DAIS'22: Proceedings of the 22nd IFIP International Conference on Distributed Applications and Interoperable Systems, June 2022
Attestation is a fundamental building block to establish trust over software systems. When used in conjunction with trusted execution environments, it guarantees the genuineness of the code executed against powerful attackers and threats, paving the
Externí odkaz:
http://arxiv.org/abs/2206.03780