Follow
Ivan Puddu
Ivan Puddu
Verified email at inf.ethz.ch - Homepage
Title
Cited by
Cited by
Year
μchain: How to Forget without Hard Forks.
I Puddu, A Dmitrienko, S Capkun
IACR Cryptology ePrint Archive 2017, 106, 2017
1182017
Rethinking software runtimes for disaggregated memory
I Calciu, MT Imran, I Puddu, S Kashyap, HA Maruf, O Mutlu, A Kolli
Proceedings of the 26th ACM International Conference on Architectural …, 2021
1042021
Method for operating a blockchain
I Puddu, A Dmitrienko, G Karame, S Capkun
US Patent App. 16/495,436, 2020
902020
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
I Puddu, M Schneider, M Haller, S Čapkun
Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), 663--680, 2021
392021
CODIC: A low-cost substrate for enabling custom in-DRAM functionalities and optimizations
L Orosa, Y Wang, M Sadrosadati, JS Kim, M Patel, I Puddu, H Luo, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
37*2021
Proximitee: Hardened sgx attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
31*2020
Project PBerry: FPGA Acceleration for Remote Memory
I Calciu, I Puddu, A Kolli, A Nowatzyk, J Gandhi, O Mutlu, ...
Proceedings of the Workshop on Hot Topics in Operating Systems, 127-135, 2019
282019
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
P Leu, I Puddu, A Ranganathan, S Čapkun
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
212018
Composite Enclaves: Towards Disaggregated Trusted Execution
M Schneider, A Dhar, I Puddu, K Kostiainen, S Čapkun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1 …, 2021
14*2021
IChannels: exploiting current management mechanisms to create covert channels in modern processors
J Haj-Yahya, JS Kim, AG Yağlıkçı, I Puddu, L Luna, Orosa, J Gómez, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
142021
On (the Lack of) Code Confidentiality in Trusted Execution Environments
I Puddu, M Schneider, D Lain, S Boschetto, S Čapkun
arXiv preprint arXiv:2212.07899, 2022
52022
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
F Groschupp, M Schneider, I Puddu, S Shinde, S Capkun
arXiv preprint arXiv:2102.02743, 2021
32021
TEEvil: Identity Lease via Trusted Execution Environments
I Puddu, D Lain, M Schneider, E Tretiakova, S Matetic, S Capkun
arXiv preprint arXiv:1903.00449, 2019
22019
Using Local Cache Coherence for Disaggregated Memory Systems
I Calciu, MT Imran, I Puddu, S Kashyap, H Al Maruf, O Mutlu, A Kolli
ACM SIGOPS Operating Systems Review 57 (1), 21-28, 2023
2023
Understanding the Capabilities of Privileged Attackers Against Trusted Execution Environments
I Puddu
ETH Zurich, 2023
2023
It's TEEtime: Bringing User Sovereignty to Smartphones
F Groschupp, M Kuhne, M Schneider, I Puddu, S Shinde, S Capkun
arXiv preprint arXiv:2211.05206, 2022
2022
The Mutable Blockchain
I Puddu
ETH Zurich, 2016
2016
Rethinking Software Runtimes for Disaggregated Memory Extended Abstract
I Calciu, T Imran, I Puddu, S Kashyap, H Maruf, O Mutlu, A Kolli
The system can't perform the operation now. Try again later.
Articles 1–18