Follow
Shweta Shinde
Shweta Shinde
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 969-986, 2016
4072016
Keystone: An open framework for architecting trusted execution environments
D Lee, D Kohlbrenner, S Shinde, K Asanović, D Song
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
335*2020
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
273*2016
Panoply: Low-TCB Linux Applications with SGX Enclaves
S Shinde, D Le Tien, S Tople, P Saxena
Proceedings of the 24th Annual Network and Distributed System Security …, 2016
2542016
Privado: Practical and secure DNN inference with enclaves
K Grover, S Tople, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
73*2018
Quantitative Verification of Neural Networks And its Security Applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 26th ACM Conference on Computer and Communications …, 2019
672019
A model counter for constraints over unbounded strings
L Luu, S Shinde, P Saxena, B Demsky
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
672014
DexterJS: robust testing platform for DOM-based XSS vulnerabilities
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
432015
Auto-patching DOM-based XSS at scale
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
322015
AutoCrypt: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
312013
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints
S Shiqi, S Shinde, S Ramesh, A Roychoudhury, P Saxena
Proceedings of the 26th Annual Network and Distributed System Security …, 2018
302018
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
Proceedings of the 29th USENIX Security Symposium, 2020, 2019
23*2019
Practical Verifiable In-network Filtering for DDoS defense
D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
232019
PodArch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
162015
Smashex: Smashing sgx enclaves using exceptions
J Cui, JZ Yu, S Shinde, P Saxena, Z Cai
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
142021
Dynamic Binary Translation for SGX Enclaves
J Cui, S Shinde, S Sen, P Saxena, P Yuan
ACM Transactions on Privacy and Security, 2022
8*2022
Elasticlave: An efficient memory model for enclaves
JZ Yu, S Shinde, TE Carlson, P Saxena
31st USENIX Security Symposium (USENIX Security 22), 4111-4128, 2022
72022
Sok: Hardware-supported trusted execution environments
M Schneider, RJ Masti, S Shinde, S Capkun, R Perez
arXiv preprint arXiv:2205.12742, 2022
52022
Building open trusted execution environments
D Kohlbrenner, S Shinde, D Lee, K Asanovic, D Song
IEEE Security & Privacy 18 (5), 47-56, 2020
32020
Sovereign smartphone: To enjoy freedom we have to control our phones
F Groschupp, M Schneider, I Puddu, S Shinde, S Capkun
arXiv preprint arXiv:2102.02743, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20