[go: up one dir, main page]

Follow
Aritra Dhar
Aritra Dhar
Huawei Zurich Research Center
Verified email at huawei.com - Homepage
Title
Cited by
Cited by
Year
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017
3202017
Increasing anonymity in bitcoin
A Saxena, J Misra, A Dhar
International Conference on Financial Cryptography and Data Security, 122-139, 2014
762014
Snappy: Fast on-chain payments with practical collaterals
V Mavroudis, K Wüst, A Dhar, K Kostiainen, S Capkun
arXiv preprint arXiv:2001.01278, 2020
332020
Proximitee: Hardened sgx attestation by proximity verification
A Dhar, I Puddu, K Kostiainen, S Capkun
Proceedings of the Tenth ACM Conference on Data and Application Security and …, 2020
302020
Methods and systems for broadcasting targeted advertisements to mobile device
D Aritra, S Vaya
US Patent 10,333,909, 2019
272019
PROTECTION: Root-of-Trust for IO in Compromised Platforms
A Dhar, E Ulqinaku, K Kostiainen, S Capkun
252020
Composite Enclaves: Towards Disaggregated Trusted Execution
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
IACR Transactions on Cryptographic Hardware and Embedded Systems 2022 (1), 2022
212022
TactBack VibroTactile braille output using smartphone and smartwatch for visually impaired
A Dhar, A Nittala, K Yadav
Proceedings of the 13th international web for all conference, 1-2, 2016
182016
CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling
A Dhar, R Purandare, M Dhawan, S R
ESEC/FSE 2015 Proceedings of the 2015 10th Joint Meeting on Foundations of …, 2015
152015
100% connectivity for location aware code based KPD in clustered WSN: merging blocks
S Bag, A Dhar, P Sarkar
International Conference on Information Security, 136-150, 2012
142012
Method and system for receiving targeted content
A Singh, G Manjunath, S Vaya, BS Solanki, S Sharma, A DHAR
US Patent 10,311,480, 2019
122019
GuardAIn: Protecting Emerging Generative AI Workloads on Heterogeneous NPU
A Dhar, C Thorens, LM Lazier, L Cavigelli
2025 IEEE Symposium on Security and Privacy (SP), 4155-4172, 2025
102025
Dedicated Security Chips in the Age of Secure Enclaves
K Kostiainen, A Dhar, S Capkun
IEEE Security & Privacy, 2020
102020
Proximitee: Hardened sgx attestation and trusted path through proximity verification
A Dhar, I Puddu, K Kostianen, S Capkun
ETH Zurich, 2018
102018
Method and system for displaying targeted content on a digital signage board
D Aritra, S Vaya, A Singh, BS Solanki, S Sharma
US Patent 10,825,057, 2020
82020
Privacy-preserving targeted advertising
T Tulabandhula, S Vaya, A Dhar
arXiv preprint arXiv:1710.03275, 2017
82017
Empowering data centers for next generation trusted computing
A Dhar, S Sridhara, S Shinde, S Capkun, R Andri
arXiv preprint arXiv:2211.00306, 2022
72022
Methods and systems for interaction with digital signage board
S Vaya, D Aritra, BS Solanki, A Singh, S Sharma, N Pande, G Manjunath
US Patent 10,489,824, 2019
62019
Integrikey: End-to-end integrity protection of user input
A Dhar, DY Yu, K Kostiainen, S Capkun
Cryptology ePrint Archive, 2017
62017
Pie: A dynamic tcb for remote systems with a platform isolation environment
M Schneider, A Dhar, I Puddu, K Kostiainen, S Capkun
CoRR, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20