Publications
Dorami: Privilege Separating Security Monitor on RISC-V TEEs
Mark Kuhne, Stavros Volos, Shweta Shinde
USENIX Security Symposium (USENIX Security 2025)
Confidential Computing with Heterogeneous Devices at Cloud-Scale
Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri
The Annual Computer Security Applications Conference (ACSAC 2024)
DevLore: Extending Arm CCA to Integrated Devices.
A Journey Beyond Memory to Interrupt Isolation
Andrin Bertschi,* Supraja Sridhara,* Friederike Groschupp, Mark Kuhne,
Benedict Schlüter, Clément Thorens, Nicolas Dutly, Srdjan Capkun, Shweta Shinde
Aster: Fixing the Android TEE Ecosystem with Arm CCA
Mark Kuhne, Supraja Sridhara, Andrin Bertschi, Nicolas Dutly,
Srdjan Capkun, Shweta Shinde
eXpect: On the Security Implications of Violations in AXI Implementations
Melisande Zonta, Andres Meza, Nora Hinderling, Lucas Deutschmann,
Francesco Restuccia, Ryan Kastner, Shweta Shinde
ACM/IEEE International Conference on Computer-Aided Design (ICCAD 2024)
Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups
Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru,
Shweta Shinde
ACM Conference on Computer and Communications Security (CCS 2024)
Heckler: Breaking Confidential VMs with Malicious Interrupts
Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
USENIX Security Symposium (USENIX Security 2024)
Acai: Extending Arm Confidential Computing Architecture Protection from CPUs to Accelerators
Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde
USENIX Security Symposium (USENIX Security 2024)
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde
IEEE Symposium on Security and Privacy (IEEE S&P 2024)
Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains
Chen Chang Lew, Christof Ferreira Torres, Shweta Shinde, Marcus Brandenburger
Workshop on System Software for Trusted Execution (SysTEX 2024)
Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde
Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3
Christof Ferreira Torres, Fiona Willi, Shweta Shinde
USENIX Security Symposium (USENIX Security 2023)
Empowering Data Centers for Next Generation Trusted Computing
Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri
It's TEEtime: Bringing User Sovereignty to Smartphones
Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
SoK: Hardware-supported Trusted Execution Environments
Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, Ronald Perez
Dynamic Binary Translation for SGX Enclaves
Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan
SmashEx: Smashing SGX Enclaves Using Exceptions
Jinhua Cui, Jason Zhijingcheng Yu, Shweta Shinde, Prateek Saxena, Zhiping Cai
Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones
Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
arXiv preprint arXiv:2102.02743
Elasticlave: An Efficient Memory Model for Enclaves
Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena
arXiv preprint arXiv:2010.08440
Binary Compatibility For SGX Enclaves
Shweta Shinde, Jinhua Cui, Satyaki Sen, Pinghai Yuan, Prateek Saxena
arXiv preprint arXiv:2009.01144
Building Open Trusted Execution Environments
David Kohlbrenner, Shweta Shinde, Dayeol Lee, Krste Asanovic, Dawn Song
IEEE Security & Privacy Magazine vol. 18, no. 5, Sept.-Oct. 2020
BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof
Shweta Shinde, Shengyi Wang, Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena
USENIX Security Symposium (USENIX Security 2020)
Acc Rate: 16.1%
Keystone: An Open Framework for Architecting Trusted Execution Environments
Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanović, Dawn Song
European Systems Conference (EuroSys 2020)
Acc Rate: 18.4%
Quantitative Verification of Neural Networks And its Security Applications
Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena
ACM Conference on Computer and Communications Security (CCS 2019)
Acc Rate: 16.2%
Practical Verifiable In-network Filtering for DDoS defense
Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang
IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
Acc Rate: 19.6%
Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints
Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena
Network and Distributed System Security Symposium (NDSS 2019)
Acc Rate: 17%
Privado: Practical and Secure DNN Inference with Enclaves
Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, Ramachandran Ramjee
arXiv preprint arXiv:1810.00602
Securing Applications From Untrusted Operating Systems Using Enclaves
Shweta Shinde
National University of Singapore
Panoply: Low-TCB Linux Applications With SGX Enclaves
Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena
Network and Distributed System Security Symposium (NDSS 2017)
Acc Rate: 16.1%
Preventing Page Faults from Telling your Secrets
Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
ACM Asia Conference on Computer and Communications Security (ASIACCS 2016)
Acc Rate: 20.9%
Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks
Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang
IEEE Symposium on Security and Privacy (Oakland 2016)
Acc Rate: 13.8%
Auto-patching DOM-Based XSS At Scale
Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena
ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2015)
Acc Rate: 25.4%
PodArch: Protecting Legacy Applications with a Purely Hardware TCB
Shweta Shinde, Shruti Tople, Deepak Kathayat, Prateek Saxena
Technical Report No. NUS-SL-TR-15-01
Poster: PodArch: Protecting Legacy Applications with a Purely Hardware TCB
Shweta Shinde, Shruti Tople, Deepak Kathayat, Prateek Saxena
IEEE Symposium on Security and Privacy (Oakland 2015)
DexterJS: Robust Testing Platform for DOM-Based XSS Vulnerabilities
Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena
ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2015)
A Model Counter for Constraints Over Unbounded Strings
Loi Luu, Shweta Shinde, Prateek Saxena, Brian Demsky
ACM International Symposium on Programming Language Design and Implementation (PLDI 2014)
Acc Rate: 18.1%
AutoCrypt: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content
Shruti Tople, Shweta Shinde, Zhaofeng Chen, Prateek Saxena
ACM Conference on Computer and Communications Security (CCS 2013)
Acc Rate: 19.8%