default search action
Emmanuel Stapf
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2022
- [b1]Emmanuel Stapf:
System Architecture Designs for Secure, Flexible and Openly-Accessible Enclave Computing. Technical University of Darmstadt, Germany, 2022
Journal Articles
- 2020
- [j3]Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Execution Environments: Properties, Applications, and Challenges. IEEE Secur. Priv. 18(2): 56-60 (2020) - [j2]Ghada Dessouky, Tommaso Frassetto, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security. IEEE Secur. Priv. 18(5): 57-66 (2020) - 2009
- [j1]Bertrand Meyer, Arno Fiva, Ilinca Ciupa, Andreas Leitner, Yi Wei, Emmanuel Stapf:
Programs That Test Themselves. Computer 42(9): 46-55 (2009)
Conference and Workshop Papers
- 2023
- [c15]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. NDSS 2023 - 2022
- [c14]Martin Schönstedt, Ferdinand Brasser, Patrick Jauernig, Emmanuel Stapf, Ahmad-Reza Sadeghi:
SafeTEE: Combining Safety and Security on ARM-based Microcontrollers. DATE 2022: 520-525 - [c13]Ghada Dessouky, Emmanuel Stapf, Pouya Mahmoody, Alexander Gruler, Ahmad-Reza Sadeghi:
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. NDSS 2022 - [c12]Tobias Cloosters, David Paaßen, Jianqiang Wang, Oussama Draissi, Patrick Jauernig, Emmanuel Stapf, Lucas Davi, Ahmad-Reza Sadeghi:
RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64. RAID 2022: 30-42 - 2021
- [c11]Ghada Dessouky, Mihailo Isakov, Michel A. Kinsy, Pouya Mahmoody, Miguel Mark, Ahmad-Reza Sadeghi, Emmanuel Stapf, Shaza Zeitouni:
Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures. DAC 2021: 985-990 - [c10]Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. USENIX Security Symposium 2021: 1073-1090 - [c9]Emmanuel Stapf, Patrick Jauernig, Ferdinand Brasser, Ahmad-Reza Sadeghi:
In Hardware We Trust? From TPM to Enclave Computing on RISC-V. VLSI-SoC 2021: 1-6 - 2020
- [c8]Huili Chen, Siam Umar Hussain, Fabian Boemer, Emmanuel Stapf, Ahmad-Reza Sadeghi, Farinaz Koushanfar, Rosario Cammarota:
Developing Privacy-preserving AI Systems: The Lessons learned. DAC 2020: 1-4 - [c7]Ghada Dessouky, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf:
INVITED: AI Utopia or Dystopia - On Securing AI Platforms. DAC 2020: 1-6 - [c6]Shaza Zeitouni, Emmanuel Stapf, Hossein Fereidooni, Ahmad-Reza Sadeghi:
On the Security of Strong Memristor-based Physically Unclonable Functions. DAC 2020: 1-6 - [c5]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. DATE 2020: 460-465 - 2019
- [c4]Lejla Batina, Patrick Jauernig, Nele Mentens, Ahmad-Reza Sadeghi, Emmanuel Stapf:
In Hardware We Trust: Gains and Pains of Hardware-assisted Security. DAC 2019: 44 - [c3]Ferdinand Brasser, David Gens, Patrick Jauernig, Ahmad-Reza Sadeghi, Emmanuel Stapf:
SANCTUARY: ARMing TrustZone with User-space Enclaves. NDSS 2019 - 2001
- [c2]Tanit Talbi, Bertrand Meyer, Emmanuel Stapf:
A Metric Framework for Object-Oriented Development. TOOLS (39) 2001: 164-172 - 2000
- [c1]Raphael Simon, Emmanuel Stapf:
New Microsoft Component Technologies. TOOLS (34) 2000: 393-394
Parts in Books or Collections
- 2010
- [p1]Bertrand Meyer, Alexander Kogtenkov, Emmanuel Stapf:
Avoid a Void: The Eradication of Null Dereferencing. Reflections on the Work of C. A. R. Hoare 2010: 189-211
Informal and Other Publications
- 2022
- [i7]Ferdinand Brasser, Patrick Jauernig, Frederik Pustelnik, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Trusted Container Extensions for Container-based Confidential Computing. CoRR abs/2205.05747 (2022) - [i6]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. CoRR abs/2210.11783 (2022) - 2021
- [i5]Ghada Dessouky, Alexander Gruler, Pouya Mahmoody, Ahmad-Reza Sadeghi, Emmanuel Stapf:
Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures. CoRR abs/2110.08139 (2021) - 2020
- [i4]Sebastian P. Bayerl, Tommaso Frassetto, Patrick Jauernig, Korbinian Riedhammer, Ahmad-Reza Sadeghi, Thomas Schneider, Emmanuel Stapf, Christian Weinert:
Offline Model Guard: Secure and Private ML on Mobile Devices. CoRR abs/2007.02351 (2020) - [i3]Rosario Cammarota, Matthias Schunter, Anand Rajan, Fabian Boemer, Ágnes Kiss, Amos Treiber, Christian Weinert, Thomas Schneider, Emmanuel Stapf, Ahmad-Reza Sadeghi, Daniel Demmler, Huili Chen, Siam Umar Hussain, M. Sadegh Riazi, Farinaz Koushanfar, Saransh Gupta, Tajana Simunic Rosing, Kamalika Chaudhuri, Hamid Nejatollahi, Nikil D. Dutt, Mohsen Imani, Kim Laine, Anuj Dubey, Aydin Aysu, Fateme Sadat Hosseini, Chengmo Yang, Eric Wallace, Pamela Norton:
Trustworthy AI Inference Systems: An Industry Research View. CoRR abs/2008.04449 (2020) - [i2]Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf:
CURE: A Security Architecture with CUstomizable and Resilient Enclaves. CoRR abs/2010.15866 (2020) - 2018
- [i1]Patrick Jahnke, Emmanuel Stapf, Jonas Mieseler, Gerhard Neumann, Patrick Eugster:
Towards Fine Grained Network Flow Prediction. CoRR abs/1808.06453 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint