Follow
Patrick Jauernig
Patrick Jauernig
SANCTUARY Systems GmbH
Verified email at sanctuary.dev - Homepage
Title
Cited by
Cited by
Year
NAUTILUS: Fishing for Deep Bugs with Grammars
C Aschermann, P Jauernig, T Frassetto, AR Sadeghi, T Holz, D Teuchert
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
2372019
SANCTUARY: ARMing TrustZone with User-space Enclaves
F Brasser, D Gens, P Jauernig, AR Sadeghi, E Stapf
26th Annual Network & Distributed System Security Symposium (NDSS 2019), 2019
1572019
FastKitten: Practical Smart Contracts on Bitcoin
P Das, L Eckey, T Frassetto, D Gens, K Hostáková, P Jauernig, S Faust, ...
28th USENIX Security Symposium (USENIX Security 19), 2019
1142019
CURE: A Security Architecture with CUstomizable and Resilient Enclaves
R Bahmani, F Brasser, G Dessouky, P Jauernig, M Klimmek, AR Sadeghi, ...
30th USENIX Security Symposium (USENIX Security 21), 2021
932021
IMIX: In-Process Memory Isolation EXtension
T Frassetto, P Jauernig, C Liebchen, AR Sadeghi
27th USENIX Security Symposium (USENIX Security 18), 2018
822018
Trusted Execution Environments: Properties, Applications, and Challenges
P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (2), 56-60, 2020
742020
Offline Model Guard: Secure and Private ML on Mobile Devices
SP Bayerl, T Frassetto, P Jauernig, K Riedhammer, AR Sadeghi, ...
23. Design, Automation and Test in Europe Conference (DATE '20), 2020
462020
TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities
R Kande, A Crump, G Persyn, P Jauernig, AR Sadeghi, A Tyagi, ...
39*2022
POSE: Practical off-chain smart contract execution
T Frassetto, P Jauernig, D Koisser, D Kretzler, B Schlosser, S Faust, ...
arXiv preprint arXiv:2210.07110, 2022
122022
Cloud computing security: foundations and research directions
A Chakraborti, R Curtmola, J Katz, J Nieh, AR Sadeghi, R Sion, Y Zhang
Foundations and Trends® in Privacy and Security 3 (2), 103-213, 2022
102022
In Hardware We Trust: Gains and Pains of Hardware-assisted Security
L Batina, P Jauernig, N Mentens, AR Sadeghi, E Stapf
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
102019
Riscyrop: Automated return-oriented programming attacks on risc-v and arm64
T Cloosters, D Paaßen, J Wang, O Draissi, P Jauernig, E Stapf, L Davi, ...
Proceedings of the 25th International Symposium on Research in Attacks …, 2022
92022
Trusted container extensions for container-based confidential computing
F Brasser, P Jauernig, F Pustelnik, AR Sadeghi, E Stapf
arXiv preprint arXiv:2205.05747, 2022
92022
DARWIN: Survival of the Fittest Fuzzing Mutators
P Jauernig, D Jakobovic, S Picek, E Stapf, AR Sadeghi
NDSS, 2023
82023
CFINSIGHT: A Comprehensive Metric for CFI Policies
T Frassetto, P Jauernig, D Koisser, AR Sadeghi
62022
Privacy-Preserving Speech Processing via STPC and TEEs
SP Bayerl, F Brasser, C Busch, T Frassetto, P Jauernig, J Kolberg, ...
62020
With great complexity comes great vulnerability: from stand-alone fixes to reconfigurable security
G Dessouky, T Frassetto, P Jauernig, AR Sadeghi, E Stapf
IEEE Security & Privacy 18 (5), 57-66, 2020
42020
SafeTEE: combining safety and security on ARM-based microcontrollers
M Schönstedt, F Brasser, P Jauernig, E Stapf, AR Sadeghi
2022 Design, Automation & Test in Europe Conference & Exhibition (DATE), 520-525, 2022
22022
{V'CER}: Efficient Certificate Validation in Constrained Networks
D Koisser, P Jauernig, G Tsudik, AR Sadeghi
31st USENIX Security Symposium (USENIX Security 22), 4491-4508, 2022
22022
Method and apparatus for isolating sensitive untrusted program code on mobile device
E Stapf, P Jauernig, F Brasser, AR Sadeghi
US Patent App. 17/287,617, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20