Follow
Shweta Shinde
Title
Cited by
Cited by
Year
Keystone: An open framework for architecting trusted execution environments
D Lee, D Kohlbrenner, S Shinde, K Asanović, D Song
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
638*2020
Data-oriented programming: On the expressiveness of non-control data attacks
H Hu, S Shinde, S Adrian, ZL Chua, P Saxena, Z Liang
Proceedings of the 37th IEEE Symposium on Security and Privacy (SP), 969-986, 2016
5472016
Panoply: Low-TCB Linux Applications with SGX Enclaves
S Shinde, D Le Tien, S Tople, P Saxena
Proceedings of the 24th Annual Network and Distributed System Security …, 2016
3202016
Preventing page faults from telling your secrets
S Shinde, ZL Chua, V Narayanan, P Saxena
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
3192016
Quantitative Verification of Neural Networks And its Security Applications
T Baluta, S Shen, S Shinde, KS Meel, P Saxena
Proceedings of the 26th ACM Conference on Computer and Communications …, 2019
1222019
Privado: Practical and secure DNN inference with enclaves
K Grover, S Tople, S Shinde, R Bhagwan, R Ramjee
arXiv preprint arXiv:1810.00602, 2018
106*2018
A model counter for constraints over unbounded strings
L Luu, S Shinde, P Saxena, B Demsky
Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014
702014
DexterJS: Robust testing platform for DOM-based XSS vulnerabilities
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
582015
SmashEx: Smashing sgx enclaves using exceptions
J Cui, JZ Yu, S Shinde, P Saxena, Z Cai
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
472021
SoK: Hardware-supported trusted execution environments
M Schneider, RJ Masti, S Shinde, S Capkun, R Perez
arXiv preprint arXiv:2205.12742, 2022
442022
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints
S Shiqi, S Shinde, S Ramesh, A Roychoudhury, P Saxena
Proceedings of the 26th Annual Network and Distributed System Security …, 2018
422018
Auto-patching DOM-based XSS at scale
I Parameshwaran, E Budianto, S Shinde, H Dang, A Sadhu, P Saxena
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
402015
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena
Proceedings of the 29th USENIX Security Symposium, 2020, 2019
38*2019
Practical Verifiable In-network Filtering for DDoS defense
D Gong, M Tran, S Shinde, H Jin, V Sekar, P Saxena, MS Kang
Proceedings of the 39th IEEE International Conference on Distributed …, 2019
332019
AutoCrypt: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content
S Tople, S Shinde, Z Chen, P Saxena
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
332013
Elasticlave: An efficient memory model for enclaves
JZ Yu, S Shinde, TE Carlson, P Saxena
31st USENIX Security Symposium (USENIX Security 22), 4111-4128, 2022
302022
PodArch: Protecting legacy applications with a purely hardware tcb
S Shinde, S Tople, D Kathayat, P Saxena
National University of Singapore, Tech. Rep, 2015
182015
Dynamic Binary Translation for SGX Enclaves
J Cui, S Shinde, S Sen, P Saxena, P Yuan
ACM Transactions on Privacy and Security, 2022
16*2022
Heckler: Breaking Confidential VMs with Malicious Interrupts
B Schlüter, S Sridhara, M Kuhne, A Bertschi, S Shinde
Proceedings of the 33rd USENIX Security Symposium, 2024, 2024
152024
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
B Schlüter, S Sridhara, A Bertschi, S Shinde
Proceedings of the 45th IEEE Symposium on Security and Privacy, 2024, 2024
132024
The system can't perform the operation now. Try again later.
Articles 1–20