Skip to main content

Showing 1–8 of 8 results for author: Jauernig, P

.
  1. DARWIN: Survival of the Fittest Fuzzing Mutators

    Authors: Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi

    Abstract: Fuzzing is an automated software testing technique broadly adopted by the industry. A popular variant is mutation-based fuzzing, which discovers a large number of bugs in practice. While the research community has studied mutation-based fuzzing for years now, the algorithms' interactions within the fuzzer are highly complex and can, together with the randomness in every instance of a fuzzer, lead… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Journal ref: Annual Network and Distributed System Security Symposium, NDSS, 2023

  2. POSE: Practical Off-chain Smart Contract Execution

    Authors: Tommaso Frassetto, Patrick Jauernig, David Koisser, David Kretzler, Benjamin Schlosser, Sebastian Faust, Ahmad-Reza Sadeghi

    Abstract: Smart contracts enable users to execute payments depending on complex program logic. Ethereum is the most notable example of a blockchain that supports smart contracts leveraged for countless applications including games, auctions and financial products. Unfortunately, the traditional method of running contract code on-chain is very expensive, for instance, on the Ethereum platform, fees have dram… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Journal ref: Annual Network and Distributed System Security Symposium, NDSS, 2023

  3. arXiv:2205.05747  [pdf, other

    cs.CR

    Trusted Container Extensions for Container-based Confidential Computing

    Authors: Ferdinand Brasser, Patrick Jauernig, Frederik Pustelnik, Ahmad-Reza Sadeghi, Emmanuel Stapf

    Abstract: Cloud computing has emerged as a corner stone of today's computing landscape. More and more customers who outsource their infrastructure benefit from the manageability, scalability and cost saving that come with cloud computing. Those benefits get amplified by the trend towards microservices. Instead of renting and maintaining full VMs, customers increasingly leverage container technologies, which… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

  4. arXiv:2205.01973  [pdf, other

    cs.CR

    V'CER: Efficient Certificate Validation in Constrained Networks

    Authors: David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi

    Abstract: We address the challenging problem of efficient trust establishment in constrained networks, i.e., networks that are composed of a large and dynamic set of (possibly heterogeneous) devices with limited bandwidth, connectivity, storage, and computational capabilities. Constrained networks are an integral part of many emerging application domains, from IoT meshes to satellite networks. A particularl… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: 18 pages, 7 figures, to be published at USENIX Security 2022

  5. arXiv:2201.09941  [pdf, other

    cs.CR cs.AR cs.SE

    TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities

    Authors: Aakash Tyagi, Addison Crump, Ahmad-Reza Sadeghi, Garrett Persyn, Jeyavijayan Rajendran, Patrick Jauernig, Rahul Kande

    Abstract: The increasing complexity of modern processors poses many challenges to existing hardware verification tools and methodologies for detecting security-critical bugs. Recent attacks on processors have shown the fatal consequences of uncovering and exploiting hardware vulnerabilities. Fuzzing has emerged as a promising technique for detecting software vulnerabilities. Recently, a few hardware fuzzi… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: To be published in the proceedings of the 31st USENIX Security Symposium, 2022

  6. arXiv:2010.15866  [pdf, other

    cs.CR

    CURE: A Security Architecture with CUstomizable and Resilient Enclaves

    Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf

    Abstract: Security architectures providing Trusted Execution Environments (TEEs) have been an appealing research subject for a wide range of computer systems, from low-end embedded devices to powerful cloud servers. The goal of these architectures is to protect sensitive services in isolated execution contexts, called enclaves. Unfortunately, existing TEE solutions suffer from significant design shortcoming… ▽ More

    Submitted 29 October, 2020; originally announced October 2020.

    Comments: Accepted to be published in the proceedings of the 30th USENIX Security Symposium (USENIX Security '21 )

  7. Offline Model Guard: Secure and Private ML on Mobile Devices

    Authors: Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert

    Abstract: Performing machine learning tasks in mobile applications yields a challenging conflict of interest: highly sensitive client information (e.g., speech data) should remain private while also the intellectual property of service providers (e.g., model parameters) must be protected. Cryptographic techniques offer secure solutions for this, but have an unacceptable overhead and moreover require frequen… ▽ More

    Submitted 5 July, 2020; originally announced July 2020.

    Comments: Original Publication (in the same form): DATE 2020

    Journal ref: DATE 2020, pages 460-465

  8. GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks

    Authors: Tigist Abera, Ferdinand Brasser, Lachlan J. Gunn, Patrick Jauernig, David Koisser, Ahmad-Reza Sadeghi

    Abstract: Autonomous collaborative networks of devices are rapidly emerging in numerous domains, such as self-driving cars, smart factories, critical infrastructure, and Internet of Things in general. Although autonomy and self-organization are highly desired properties, they increase vulnerability to attacks. Hence, autonomous networks need dependable mechanisms to detect malicious devices in order to prev… ▽ More

    Submitted 1 August, 2023; v1 submitted 11 October, 2019; originally announced October 2019.

    Journal ref: RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses, October 2021, Pages 220-234