ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2404.03387
  4. Cited By
Heckler: Breaking Confidential VMs with Malicious Interrupts

Heckler: Breaking Confidential VMs with Malicious Interrupts

4 April 2024
Benedict Schluter
Supraja Sridhara
Mark Kuhne
Andrin Bertschi
Shweta Shinde
ArXiv (abs)PDFHTML

Papers citing "Heckler: Breaking Confidential VMs with Malicious Interrupts"

12 / 12 papers shown
Title
Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments
Attestable builds: compiling verifiable binaries on untrusted systems using trusted execution environments
Daniel Hugenroth
Mario Lins
René Mayrhofer
A. Beresford
26
0
0
05 May 2025
Confidential Serverless Computing
Confidential Serverless Computing
Patrick Sabanic
Masanori Misono
Teofil Bodea
Julian Pritzi
Michael Hackl
Dimitrios Stavrakakis
Pramod Bhatotia
98
0
0
30 Apr 2025
BlindexTEE: A Blind Index Approach towards TEE-supported End-to-end
  Encrypted DBMS
BlindexTEE: A Blind Index Approach towards TEE-supported End-to-end Encrypted DBMS
Louis Vialar
James Ménétrey
V. Schiavoni
Pascal Felber
FedML
28
0
0
04 Nov 2024
Privacy-Preserving Decentralized AI with Confidential Computing
Privacy-Preserving Decentralized AI with Confidential Computing
Dayeol Lee
Jorge António
Hisham Khan
11
2
0
17 Oct 2024
Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling
Ditto: Elastic Confidential VMs with Secure and Dynamic CPU Scaling
Shixuan Zhao
Mengyuan Li
Mengjia Yan
Zhiqiang Lin
72
0
0
23 Sep 2024
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and
  Future Directions
Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions
Qifan Wang
David Oswald
75
0
0
21 Aug 2024
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory
  to Interrupt Isolation
Devlore: Extending Arm CCA to Integrated Devices A Journey Beyond Memory to Interrupt Isolation
Andrin Bertschi
Supraja Sridhara
Friederike Groschupp
Mark Kuhne
Benedict Schluter
Clément Thorens
Nicolas Dutly
Srdjan Capkun
Shweta Shinde
142
3
0
11 Aug 2024
Aster: Fixing the Android TEE Ecosystem with Arm CCA
Aster: Fixing the Android TEE Ecosystem with Arm CCA
Mark Kuhne
Supraja Sridhara
Andrin Bertschi
Nicolas Dutly
Srdjan Capkun
Shweta Shinde
136
2
0
23 Jul 2024
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals
Supraja Sridhara
Andrin Bertschi
Benedict Schluter
Shweta Shinde
SILM
46
3
0
22 Apr 2024
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP
Benedict Schluter
Supraja Sridhara
Andrin Bertschi
Shweta Shinde
58
25
0
04 Apr 2024
Formal Security Analysis of the AMD SEV-SNP Software Interface
Formal Security Analysis of the AMD SEV-SNP Software Interface
Petar Paradzik
Ante Derek
Marko Horvat
105
1
0
15 Mar 2024
The Road to Trust: Building Enclaves within Confidential VMs
The Road to Trust: Building Enclaves within Confidential VMs
Wenhao Wang
Linke Song
Benshan Mei
Shuang Liu
Shijun Zhao
Shoumeng Yan
XiaoFeng Wang
Dan Meng
Rui Hou
25
2
0
18 Feb 2024
1