Fault-tolerance techniques depend on replication to enhance availability...
High-assurance security systems require strong isolation from the untrus...
In a previous paper, we have shown that clause sets belonging to the Hor...
Federated Learning (FL) is an emerging machine learning paradigm that en...
Recent years have brought microarchitectural security intothe spotlight,...
The Bernays-Schönfinkel first-order logic fragment over simple linear re...
Speculative vulnerabilities such as Spectre and Meltdown expose speculat...
Trust is of paramount concern for tenants to deploy their security-sensi...
Confidential multi-stakeholder machine learning (ML) allows multiple par...
Data-driven intelligent applications in modern online services have beco...
A lease is an important primitive for building distributed protocols, an...
Trusted computing defines how to securely measure, store, and verify the...
Trusted Execution Environments (TEEs), such as Intel Software Guard
eXte...
Trust is arguably the most important challenge for critical services bot...
The LEGaTO project leverages task-based programming models to provide a
...
Microservices - combined with secure containers - facilitate new ways to...
SpecFuzz is the first tool that enables dynamic testing for speculative
...
This paper presents PUBSUB-SGX, a content-based publish-subscribe system...
Machine learning has become a critical component of modern data-driven o...
In this paper, we present our approach for solving the DEBS Grand Challe...
A recent discovery of a new class of microarchitectural attacks called
S...
The join operation is a fundamental building block of parallel data
proc...
Containers are becoming the de facto standard to package and deploy
appl...
We present the SecureCloud EU Horizon 2020 project, whose goal is to ena...