Shweta Shinde

Orcid: 0000-0003-0415-2960

According to our database1, Shweta Shinde authored at least 28 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
ACAI: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators.
CoRR, 2023

Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Dynamic Binary Translation for SGX Enclaves.
ACM Trans. Priv. Secur., 2022

It's TEEtime: Bringing User Sovereignty to Smartphones.
CoRR, 2022

Empowering Data Centers for Next Generation Trusted Computing.
CoRR, 2022

SoK: Hardware-supported Trusted Execution Environments.
CoRR, 2022

Elasticlave: An Efficient Memory Model for Enclaves.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones.
CoRR, 2021

SmashEx: Smashing SGX Enclaves Using Exceptions.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Building Open Trusted Execution Environments.
IEEE Secur. Priv., 2020

Binary Compatibility For SGX Enclaves.
CoRR, 2020

BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.
Proceedings of the 29th USENIX Security Symposium, 2020

Keystone: an open framework for architecting trusted execution environments.
Proceedings of the EuroSys '20: Fifteenth EuroSys Conference 2020, 2020

2019
Keystone: A Framework for Architecting TEEs.
CoRR, 2019

Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Practical Verifiable In-network Filtering for DDoS Defense.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Quantitative Verification of Neural Networks and Its Security Applications.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privado: Practical and Secure DNN Inference.
CoRR, 2018

Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution.
CoRR, 2018

BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves.
CoRR, 2018

2017
Panoply: Low-TCB Linux Applications With SGX Enclaves.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Preventing Page Faults from Telling Your Secrets.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.
CoRR, 2015

DexterJS: robust testing platform for DOM-based XSS vulnerabilities.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Auto-patching DOM-based XSS at scale.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

2014
A model counter for constraints over unbounded strings.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

2013
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013


  Loading...