Follow
Ivan Puddu
Ivan Puddu
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
μchain: How to Forget without Hard Forks.
I Puddu, A Dmitrienko, S Capkun
IACR Cryptology ePrint Archive 2017, 106, 2017
1272017
Rethinking software runtimes for disaggregated memory
I Calciu, MT Imran, I Puddu, S Kashyap, HA Maruf, O Mutlu, A Kolli
Proceedings of the 26th ACM International Conference on Architectural …, 2021
1252021
Method for operating a blockchain
I Puddu, A Dmitrienko, G Karame, S Capkun
US Patent App. 16/495,436, 2020
922020
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
I Puddu, M Schneider, M Haller, S Čapkun
Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), 663--680, 2021
462021
CODIC: A low-cost substrate for enabling custom in-DRAM functionalities and optimizations
L Orosa, Y Wang, M Sadrosadati, JS Kim, M Patel, I Puddu, H Luo, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
43*2021
Project PBerry: FPGA Acceleration for Remote Memory
I Calciu, I Puddu, A Kolli, A Nowatzyk, J Gandhi, O Mutlu, ...
Proceedings of the Workshop on Hot Topics in Operating Systems, 127-135, 2019
332019
Proximitee: Hardened sgx attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
32*2020
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
P Leu, I Puddu, A Ranganathan, S Čapkun
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
222018
IChannels: exploiting current management mechanisms to create covert channels in modern processors
J Haj-Yahya, JS Kim, AG Yağlıkçı, I Puddu, L Luna, Orosa, J Gómez, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
182021
Composite Enclaves: Towards Disaggregated Trusted Execution
M Schneider, A Dhar, I Puddu, K Kostiainen, S Čapkun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1 …, 2021
17*2021
On (The Lack Of) code confidentiality in trusted execution environments
I Puddu, M Schneider, D Lain, S Boschetto, S Čapkun
2024 IEEE Symposium on Security and Privacy (SP), 213-213, 2024
52024
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
F Groschupp, M Schneider, I Puddu, S Shinde, S Capkun
arXiv preprint arXiv:2102.02743, 2021
32021
TEEvil: Identity Lease via Trusted Execution Environments
I Puddu, D Lain, M Schneider, E Tretiakova, S Matetic, S Capkun
arXiv preprint arXiv:1903.00449, 2019
22019
Understanding the Capabilities of Privileged Attackers Against Trusted Execution Environments
I Puddu
ETH Zurich, 2023
12023
Using Local Cache Coherence for Disaggregated Memory Systems
I Calciu, MT Imran, I Puddu, S Kashyap, H Al Maruf, O Mutlu, A Kolli
ACM SIGOPS Operating Systems Review 57 (1), 21-28, 2023
2023
It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones
F Groschupp, M Kuhne, M Schneider, I Puddu, S Shinde, S Capkun
arXiv preprint arXiv:2211.05206, 2022
2022
The Mutable Blockchain
I Puddu
ETH Zurich, 2016
2016
Rethinking Software Runtimes for Disaggregated Memory Extended Abstract
I Calciu, T Imran, I Puddu, S Kashyap, H Maruf, O Mutlu, A Kolli
The system can't perform the operation now. Try again later.
Articles 1–18