Publications

2025

2025

  1. S&P 2025
    GuardAIn: Protecting Emerging Generative AI Workloads on Heterogeneous NPU
    Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, and Lukas Cavigelli
    2025

2024

2024

  1. ACSAC 2024
    Confidential Computing with Heterogeneous Devices at Cloud-Scale
    Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, and Renzo Andri
    ACSAC 2024, 2024
  2. arXiv 2024
    Ascend-CC: Confidential Computing on Heterogeneous NPU for Emerging Generative AI Workloads
    Aritra Dhar, Clément Thorens, Lara Magdalena Lazier, and Lukas Cavigelli
    2024
  3. DAC 2024 WIP
    Confidential Computing with Heterogeneous Devices at Cloud-Scale
    Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, and Renzo Andri
    DAC 2024 (Work-in-Progress Poster), 2024
  4. DAC 2024 WIP
    Principles for Enabling TEEs on Domain-Specific Accelerators
    Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, and Renzo Andri
    DAC 2024 (Work-in-Progress Poster), 2024

2022

2022

  1. arXiv 2022
    Empowering Data Centers for Next Generation Trusted Computing
    Aritra Dhar, Supraja Sridhara, Shweta Shinde, Srdjan Capkun, and Renzo Andri
    2022
  2. CHES 2022
    Composite Enclaves: Towards Disaggregated Trusted Execution
    Moritz Schneider, Aritra Dhar, Ivan Puddu, Kari Kostiainen, and Srdjan Capkun
    CHES 2022, 2022

2021

2021

  1. Thesis 2021
    Building Trust in Modern Computing Platforms
    Aritra Dhar
    ETH Zurich, 2021

2020

2020

  1. S&P Mag 2020
    Dedicated Security Chips in the Age of Secure Enclaves
    Kari Kostiainen, Aritra Dhar, and Srdjan Capkun
    IEEE Security and Privacy, Sep 2020
  2. CODASPY 2020
    ProximiTEE: Hardened SGX Attestation by Proximity Verification
    Aritra Dhar, Ivan Puddu, Kari Kostiainen, and Srdjan Capkun
    CODASPY ’20 (Best Paper Award), New Orleans, LA, USA, Sep 2020
  3. NDSS 2020
    ProtectIOn: Root-of-Trust for IO in Compromised Platforms
    Aritra Dhar, Enis Ulqinaku, Kari Kostiainen, and Srdjan Capkun
    27th Annual Network and Distributed System Security Symposium, NDSS, Sep 2020
  4. NDSS 2020
    Snappy: Fast On-chain Payments with Practical Collaterals
    Vasilios Mavroudis, Karl Wüst, Aritra Dhar, Kari Kostiainen, and Srdjan Capkun
    In , Sep 2020
  5. arXiv 2020
    IntegriScreen: Visually Supervising Remote User Interactions on Compromised Clients
    Ivo Sluganovic, Enis Ulqinaku, Aritra Dhar, Daniele Lain, Srdjan Capkun, and Ivan Martinovic
    CoRR, Sep 2020
  6. JBA 2020
    Privacy preserving targeted advertising and recommendations
    Theja Tulabandhula, Shailesh Vaya, and Aritra Dhar
    Journal of Business Analytics, Sep 2020

2019

2019

  1. NSDI 2019
    Deniable Upload and Download via Passive Participation
    David M. Sommer, Aritra Dhar, Luka Malisa, Esfandiar Mohammadi, Daniel Ronzani, and Srdjan Capkun
    16th USENIX Symposium on Networked Systems Design and Implementation, NSDI, Sep 2019

2018

2018

  1. RV 2018
    METIS: Resource and Context-Aware Monitoring of Finite State Properties
    Garvita Allabadi, Aritra Dhar, Ambreen Bashir, and Rahul Purandare
    Runtime Verification - 18th International Conference, RV, Sep 2018

2017

2017

  1. ePrint Arch. 2017
    IntegriKey: End-to-End Integrity Protection of User Input
    Aritra Dhar, Der-Yeuan Yu, Kari Kostiainen, and Srdjan Capkun
    IACR Cryptol. ePrint Arch., Sep 2017
  2. USENIX 2017
    ROTE: Rollback Protection for Trusted Execution
    Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David Sommer, Arthur Gervais, Ari Juels, and Srdjan Capkun
    26th USENIX Security Symposium (USENIX Security), Sep 2017

2016

2016

  1. W4A 2016
    TactBack: VibroTactile braille output using smartphone and smartwatch for visually impaired
    Aritra Dhar, Aditya Nittala, and Kuldeep Yadav
    Proceedings of the 13th Web for All Conference, W4A, Sep 2016

2015

2015

  1. FSE 2015
    CLOTHO: saving programs from malformed strings and incorrect string-handling
    Aritra Dhar, Rahul Purandare, Mohan Dhawan, and Suresh Rangaswamy
    Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ESEC/FSE, Sep 2015

2014

2014

  1. FC 2014
    Increasing Anonymity in Bitcoin
    Amitabh Saxena, Janardan Misra, and Aritra Dhar
    Financial Cryptography and Data Security - FC 2014 Workshops, BITCOIN, Sep 2014

2013

2013

  1. ICT-EurAsia 2013
    Code Based KPD Scheme with Full Connectivity: Deterministic Merging
    Pinaki Sarkar, and Aritra Dhar
    Information and Communicatiaon Technology - International Conference, ICT-EurAsia, Sep 2013
  2. MobiHoc 2013
    Connecting, scaling and securing RS code and TD based KPDs in WSNs: deterministic merging
    Pinaki Sarkar, Brijesh Kumar Rai, and Aritra Dhar
    The Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc, Sep 2013

2012

2012

  1. ISC 2012
    100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks
    Samiran Bag, Aritra Dhar, and Pinaki Sarkar
    Information Security - 15th International Conference, ISC, Sep 2012