I am an assistant professor at the Computer Science department in ETH Zurich. I lead the Secure & Trustworthy Systems (SECTRS) group. I am a member of the Institute of Information Security and the ZISC Center.

My research is broadly at the intersection of trusted computing, system security, and program analysis. My group focuses on foundational aspects of security to protect phones, servers, and accelerators as well as practical aspects of realizing these solutions by building large systems.

My group has several open positions, see SECTRS group page.

Research


Dorami: Privilege Separating Security Monitor on RISC-V TEEs

Mark Kuhne, Stavros Volos, Shweta Shinde
USENIX Security Symposium (USENIX Security 2025)
arXiv version Project Page Code

Xray: Detecting and Exploiting Vulnerabilities in Arm AXI Interconnects

Mélisande Zonta-Roudes, Nora Hinderling, Shweta Shinde
Design, Automation and Test in Europe Conference (DATE 2025)
Paper (coming soon) Project Page Code

Confidential Computing with Heterogeneous Devices at Cloud-Scale

Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, Renzo Andri
The Annual Computer Security Applications Conference (ACSAC 2024)
Paper arXiv version

DevLore: Extending Arm CCA to Integrated Devices. A Journey Beyond Memory to Interrupt Isolation

Andrin Bertschi,* Supraja Sridhara,* Friederike Groschupp, Mark Kuhne, Benedict Schlüter, Clément Thorens, Nicolas Dutly, Srdjan Capkun, Shweta Shinde
arXiv preprint arXiv:2408.05835
arXiv version BibTeX

Aster: Fixing the Android TEE Ecosystem with Arm CCA

Mark Kuhne, Supraja Sridhara, Andrin Bertschi, Nicolas Dutly, Srdjan Capkun, Shweta Shinde
arXiv preprint arXiv:2407.16694
arXiv version BibTeX

eXpect: On the Security Implications of Violations in AXI Implementations

Mélisande Zonta-Roudes, Andres Meza, Nora Hinderling, Lucas Deutschmann, Francesco Restuccia, Ryan Kastner, Shweta Shinde
ACM/IEEE International Conference on Computer-Aided Design (ICCAD 2024)
Paper Project Page Code

Rolling in the Shadows: Analyzing the Extraction of MEV Across Layer-2 Rollups

Christof Ferreira Torres, Albin Mamuti, Ben Weintraub, Cristina Nita-Rotaru, Shweta Shinde
ACM Conference on Computer and Communications Security (CCS 2024)
Paper arXiv version BibTeX Code

Heckler: Breaking Confidential VMs with Malicious Interrupts

Benedict Schlüter, Supraja Sridhara, Mark Kuhne, Andrin Bertschi, Shweta Shinde
USENIX Security Symposium (USENIX Security 2024)
Paper arXiv version Project Page Code BibTeX

Acai: Protecting Accelerator Execution with Arm Confidential Computing Architecture

Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Mark Kuhne, Fabio Aliberti, Shweta Shinde
USENIX Security Symposium (USENIX Security 2024)
Paper arXiv version Project Page Code BibTeX

WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP

Benedict Schlüter, Supraja Sridhara, Andrin Bertschi, Shweta Shinde
IEEE Security & Privacy (IEEE S&P 2024)
Paper arXiv version Project Page Code BibTeX

Revisiting Rollbacks on Smart Contracts in TEE-protected Private Blockchains

Chen Chang Lew, Christof Ferreira Torres, Shweta Shinde, Marcus Brandenburger
Workshop on System Software for Trusted Execution (SysTEX 2024)
Paper Code

Sigy: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals

Supraja Sridhara, Andrin Bertschi, Benedict Schlüter, Shweta Shinde
arXiv preprint arXiv:2404.13998
arXiv version BibTeX

Is Your Wallet Snitching On You? An Analysis on the Privacy Implications of Web3

Christof Ferreira Torres, Fiona Willi, Shweta Shinde
USENIX Security Symposium (USENIX Security 2023)
Acc Rate: 29.2% Paper arXiv version Code BibTeX

It's TEEtime: A New Architecture Bringing Sovereignty to Smartphones

Friederike Groschupp, Mark Kuhne, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
arXiv preprint arXiv:2211.05206
arXiv version BibTeX

SoK: Hardware-supported Trusted Execution Environments

Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, Ronald Perez
arXiv preprint arXiv:2205.12742
arXiv version BibTeX

Elasticlave: An Efficient Memory Model for Enclaves

Jason Zhijingcheng Yu, Shweta Shinde, Trevor E. Carlson, Prateek Saxena
USENIX Security Symposium (USENIX Security 2022)
Acc Rate: 17.2% Paper arXiv version Code BibTeX

Dynamic Binary Translation for SGX Enclaves

Jinhua Cui, Shweta Shinde, Satyaki Sen, Prateek Saxena, Pinghai Yuan
ACM Transactions on Privacy and Security (TOPS 2022)
Paper arXiv version Project Page Code BibTeX

SmashEx: Smashing SGX Enclaves Using Exceptions

Jinhua Cui,* Jason Zhijingcheng Yu,* Shweta Shinde, Prateek Saxena, Zhiping Cai
ACM Conference on Computer and Communications Security (CCS 2021)
Acc Rate: 22.5% Paper arXiv version Project Page BibTeX

Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones

Friederike Groschupp, Moritz Schneider, Ivan Puddu, Shweta Shinde, Srdjan Capkun
arXiv preprint arXiv:2102.02743
arXiv version BibTeX

Building Open Trusted Execution Environments

David Kohlbrenner, Shweta Shinde, Dayeol Lee, Krste Asanovic, Dawn Song
IEEE Security & Privacy Magazine vol. 18, no. 5, Sept.-Oct. 2020
Article BibTeX

BesFS: A POSIX Filesystem for Enclaves with a Mechanized Safety Proof

Shweta Shinde,* Shengyi Wang,* Pinghai Yuan, Aquinas Hobor, Abhik Roychoudhury, Prateek Saxena
USENIX Security Symposium (USENIX Security 2020)
Acc Rate: 16.1% Paper arXiv version Talk Video Code BibTeX

Keystone: An Open Framework for Architecting Trusted Execution Environments

Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanović, Dawn Song
European Systems Conference (EuroSys 2020)
Acc Rate: 18.4% Paper arXiv version Project Page Code BibTeX

Quantitative Verification of Neural Networks And its Security Applications

Teodora Baluta, Shiqi Shen, Shweta Shinde, Kuldeep S. Meel, Prateek Saxena
ACM Conference on Computer and Communications Security (CCS 2019)
Acc Rate: 16.2% Paper arXiv version Code BibTeX

Practical Verifiable In-network Filtering for DDoS defense

Deli Gong, Muoi Tran, Shweta Shinde, Hao Jin, Vyas Sekar, Prateek Saxena, Min Suk Kang
IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
Acc Rate: 19.6% Paper arXiv version Code BibTeX

Neuro-Symbolic Execution: Augmenting Symbolic Execution with Neural Constraints

Shiqi Shen, Shweta Shinde, Soundarya Ramesh, Abhik Roychoudhury, Prateek Saxena
Network and Distributed System Security Symposium (NDSS 2019)
Acc Rate: 17% Paper arXiv version BibTeX

Privado: Practical and Secure DNN Inference with Enclaves

Karan Grover, Shruti Tople, Shweta Shinde, Ranjita Bhagwan, Ramachandran Ramjee
arXiv preprint arXiv:1810.00602
arXiv version BibTeX

Securing Applications From Untrusted Operating Systems Using Enclaves

National University of Singapore
PhD Thesis BibTeX

Panoply: Low-TCB Linux Applications With SGX Enclaves

Shweta Shinde, Dat Le Tien, Shruti Tople, Prateek Saxena
Network and Distributed System Security Symposium (NDSS 2017)
Acc Rate: 16.1% Paper Talk Video Code BibTeX

Preventing Page Faults from Telling your Secrets

Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
ACM Asia Conference on Computer and Communications Security (ASIACCS 2016)
Acc Rate: 20.9% Paper arXiv version Talk BibTeX

Data-Oriented Programming: On the Expressiveness of Non-Control Data Attacks

Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, Zhenkai Liang
IEEE Symposium on Security and Privacy (Oakland 2016)
Acc Rate: 13.8% Paper Code BibTeX

Auto-patching DOM-Based XSS At Scale

Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena
ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2015)
Acc Rate: 25.4% Paper Project Page BibTeX

A Model Counter for Constraints Over Unbounded Strings

Loi Luu, Shweta Shinde, Prateek Saxena, Brian Demsky
ACM International Symposium on Programming Language Design and Implementation (PLDI 2014)
Acc Rate: 18.1% Paper Talk Code BibTeX

AutoCrypt: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content

Shruti Tople, Shweta Shinde, Zhaofeng Chen, Prateek Saxena
ACM Conference on Computer and Communications Security (CCS 2013)
Acc Rate: 19.8% Paper Code BibTeX

PodArch: Protecting Legacy Applications with a Purely Hardware TCB

Shweta Shinde, Shruti Tople, Deepak Kathayat, Prateek Saxena
Technical Report No. NUS-SL-TR-15-01
Tech Report Code BibTeX

DexterJS: Robust Testing Platform for DOM-Based XSS Vulnerabilities

Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena
ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE 2015)
Paper Project Page BibTeX

Poster: PodArch: Protecting Legacy Applications with a Purely Hardware TCB

Shweta Shinde, Shruti Tople, Deepak Kathayat, Prateek Saxena
IEEE Symposium on Security and Privacy (Oakland 2015)
BibTeX

Teaching


Systems Security (Autumn 2022-24)

Information Security Lab (Autumn 2020-24)

Seminar on Systems Security (Spring 2021-24)

Current Topics in Information Security (Autumn 2021-24)

Computer Systems (Autumn 2021-22)

Service


PC: NDSS (2025), USENIX Security (2022, 2023, 2024, 2025), CCS (2022, 2023, 2024), Oakland (2023), EuroSec (2021, 2022, 2023), SysTEX (2022, 2024), SILM (2023, 2024), PriSC (2021), ICISS (2020, 2019)

Reviewer: ACM Transactions on Computer Systems (TOCS), ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Information Forensics & Security (TIFS), IEEE S&P Magazine, IEEE Computer Architecture Letters

Program Co-Chair: PriSC (2023 and 2024), SysTEX 2023, ASIACCS-SBC 2021, OSEW 2019



Contact


CAB F 71.2
Universitätstrasse 6,
8092 Zürich