Patrick Jauernig

Orcid: 0000-0002-4002-3691

According to our database1, Patrick Jauernig authored at least 21 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DARWIN: Survival of the Fittest Fuzzing Mutators.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

POSE: Practical Off-chain Smart Contract Execution.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Trusted Container Extensions for Container-based Confidential Computing.
CoRR, 2022

V'CER: Efficient Certificate Validation in Constrained Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Proceedings of the 31st USENIX Security Symposium, 2022

RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

CFInsight: A Comprehensive Metric for CFI Policies.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SafeTEE: Combining Safety and Security on ARM-based Microcontrollers.
Proceedings of the 2022 Design, Automation & Test in Europe Conference & Exhibition, 2022

VirTEE: a full backward-compatible TEE with native live migration and secure I/O.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
In Hardware We Trust? From TPM to Enclave Computing on RISC-V.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

CURE: A Security Architecture with CUstomizable and Resilient Enclaves.
Proceedings of the 30th USENIX Security Symposium, 2021

GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

2020
Trusted Execution Environments: Properties, Applications, and Challenges.
IEEE Secur. Priv., 2020

With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security.
IEEE Secur. Priv., 2020

Offline Model Guard: Secure and Private ML on Mobile Devices.
Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition, 2020

INVITED: AI Utopia or Dystopia - On Securing AI Platforms.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
FastKitten: Practical Smart Contracts on Bitcoin.
IACR Cryptol. ePrint Arch., 2019

SANCTUARY: ARMing TrustZone with User-space Enclaves.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NAUTILUS: Fishing for Deep Bugs with Grammars.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

In Hardware We Trust: Gains and Pains of Hardware-assisted Security.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
IMIX: In-Process Memory Isolation EXtension.
Proceedings of the 27th USENIX Security Symposium, 2018


  Loading...