What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shweta Shinde
Google Scholar
ORCID:
0000-0003-0415-2960
20
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
OPENCCA: An Open Framework to Enable Arm CCA Research.
Andrin Bertschi
Shweta Shinde
2025
conf/asiaccs
Monocle: Transient Execution Proof Memory Views for Runtime Compiled Code.
Matteo Oldani
William Blair
Shweta Shinde
Matthias Neugschwandtner
2025
conf/asiaccs
Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals.
Supraja Sridhara
Andrin Bertschi
Benedict Schlüter
Shweta Shinde
2025
conf/uss
Dorami: Privilege Separating Security Monitor on RISC-V TEEs.
Mark Kuhne
Stavros Volos
Shweta Shinde
2024
conf/ccs
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups.
Christof Ferreira Torres
Albin Mamuti
Ben Weintraub
Cristina Nita-Rotaru
Shweta Shinde
2024
conf/uss
ACAI: Protecting Accelerator Execution with Arm Confidential Computing Architecture.
Supraja Sridhara
Andrin Bertschi
Benedict Schlüter
Mark Kuhne
Fabio Aliberti
Shweta Shinde
2024
conf/uss
HECKLER: Breaking Confidential VMs with Malicious Interrupts.
Benedict Schlüter
Supraja Sridhara
Mark Kuhne
Andrin Bertschi
Shweta Shinde
2024
conf/sp
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP.
Benedict Schlüter
Supraja Sridhara
Andrin Bertschi
Shweta Shinde
2024
conf/eurosp
Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains.
Chen Chang Lew
Christof Ferreira Torres
Shweta Shinde
Marcus Brandenburger
2024
conf/acsac
Confidential Computing with Heterogeneous Devices at Cloud-Scale.
Aritra Dhar
Supraja Sridhara
Shweta Shinde
Srdjan Capkun
Renzo Andri
2023
conf/uss
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3.
Christof Ferreira Torres
Fiona Willi
Shweta Shinde
2022
conf/uss
Elasticlave: An Efficient Memory Model for Enclaves.
Jason Zhijingcheng Yu
Shweta Shinde
Trevor E. Carlson
Prateek Saxena
2021
conf/ccs
SmashEx: Smashing SGX Enclaves Using Exceptions.
Jinhua Cui
Jason Zhijingcheng Yu
Shweta Shinde
Prateek Saxena
Zhiping Cai
2020
conf/uss
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof.
Shweta Shinde
Shengyi Wang
Pinghai Yuan
Aquinas Hobor
Abhik Roychoudhury
Prateek Saxena
2019
conf/ccs
Quantitative Verification of Neural Networks and Its Security Applications.
Teodora Baluta
Shiqi Shen
Shweta Shinde
Kuldeep S. Meel
Prateek Saxena
2019
conf/ndss
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints.
Shiqi Shen
Shweta Shinde
Soundarya Ramesh
Abhik Roychoudhury
Prateek Saxena
2017
conf/ndss
Panoply: Low-TCB Linux Applications With SGX Enclaves.
Shweta Shinde
Dat Le Tien
Shruti Tople
Prateek Saxena
2016
conf/ccs
Preventing Page Faults from Telling Your Secrets.
Shweta Shinde
Zheng Leong Chua
Viswesh Narayanan
Prateek Saxena
2016
conf/sp
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Hong Hu
Shweta Shinde
Sendroiu Adrian
Zheng Leong Chua
Prateek Saxena
Zhenkai Liang
2013
conf/ccs
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content.
Shruti Tople
Shweta Shinde
Zhaofeng Chen
Prateek Saxena
Coauthors
Abhik Roychoudhury
(2)
Albin Mamuti
(1)
Andrin Bertschi
(5)
Aquinas Hobor
(1)
Aritra Dhar
(1)
Ben Weintraub
(1)
Benedict Schlüter
(4)
Chen Chang Lew
(1)
Christof Ferreira Torres
(3)
Cristina Nita-Rotaru
(1)
Dat Le Tien
(1)
Fabio Aliberti
(1)
Fiona Willi
(1)
Hong Hu
(1)
Jason Zhijingcheng Yu
(2)
Jinhua Cui
(1)
Kuldeep S. Meel
(1)
Marcus Brandenburger
(1)
Mark Kuhne
(3)
Matteo Oldani
(1)
Matthias Neugschwandtner
(1)
Pinghai Yuan
(1)
Prateek Saxena
(9)
Renzo Andri
(1)
Sendroiu Adrian
(1)
Shengyi Wang
(1)
Shiqi Shen
(2)
Shruti Tople
(2)
Shweta Shinde
(20)
Soundarya Ramesh
(1)
Srdjan Capkun
(1)
Stavros Volos
(1)
Supraja Sridhara
(5)
Teodora Baluta
(1)
Trevor E. Carlson
(1)
Viswesh Narayanan
(1)
William Blair
(1)
Zhaofeng Chen
(1)
Zheng Leong Chua
(2)
Zhenkai Liang
(1)
Zhiping Cai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to