Save what must be saved: Secure context switching with SailorNeelu S. KalaniThomas Bourgeatet al.2025USENIX Security 2025Conference paper
Intel TDX Demystified: A Top-Down ApproachPau-Chen ChengWojciech Ozgaet al.2024ACM Computing SurveysPaper
Towards a Formally Verified Security Monitor for VM-based Confidential ComputingWojciech OzgaGuerney Huntet al.2023MICRO 2023Workshop paper
Wawel: Architecture for Scalable Attestation of Heterogeneous Virtual Execution EnvironmentsWojciech OzgaPatricia Sagmeisteret al.2023CLOUD 2023Conference paper
CHORS: Hardening High-Assurance Security Systems with Trusted ComputingWojciech OzgaRasha Faqehet al.2022SAC 2022Conference paper
TRIGLAV: Remote Attestation of the Virtual Machine's Runtime Integrity in Public CloudsWojciech OzgaDo Le Quocet al.2021CLOUD 2021Conference paper
Perun: Confidential Multi-Stakeholder Machine Learning Framework with Hardware Acceleration SupportWojciech OzgaDo Le Quoc et al.2021IFIP DBSec 2021Conference paper