Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023
Easy-plane dominant stochastic magnetic tunnel junction with synthetic antiferromagnetic layersJonathan Z. SunChristopher Safranskiet al.2023Physical Review B
AccShield: A New Trusted Execution Environment with Machine-Learning AcceleratorsWei RenWilliam Kozlowskiet al.2023DAC 2023
Wawel: Architecture for Scalable Attestation of Heterogeneous Virtual Execution EnvironmentsWojciech OzgaPatricia Sagmeisteret al.2023CLOUD 2023
Free the Turtles: Removing Nested Virtualization for Performance and Confidentiality in the CloudMengmei YeAngelo Ruoccoet al.2023CLOUD 2023
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022
No More Turtles: The SecondaryVM Framework - An Alternative to Nested VirtualizationMengmei YeAngelo Ruocco2022KVM Forum 2022
Adding Fairness to Order: Preventing Front-Running Attacks in BFT Protocols using TEEsChrysoula StathakopoulouSigne Rüschet al.2021SRDS 2021