From Confidential Computing to Zero Trust, Come Along for the (Bumpy?) RideMengmei YeSandhya Koteshwaraet al.2024MICRO 2024
STRonG: System Topology Risk Analysis on GraphsLars SchneidenbachSandhya Koteshwaraet al.2024CCGrid 2024
Zero Trust Hardware Architectures: when we “never trust”, what can we do to “always verify?”Mengmei YeSandhya Koteshwara2022WISE 2022