Ahmad-reza A. Sadeghi
#115,837
Most Influential Person Now
Ahmad-reza A. Sadeghi's AcademicInfluence.com Rankings
Ahmad-reza A. Sadeghicomputer-science Degrees
Computer Science
#4513
World Rank
#4760
Historical Rank
Internet Of Things
#1
World Rank
#1
Historical Rank
Database
#1727
World Rank
#1811
Historical Rank

Download Badge
Computer Science
Ahmad-reza A. Sadeghi's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Engineering Sharif University of Technology
Similar Degrees You Can Earn
Why Is Ahmad-reza A. Sadeghi Influential?
(Suggest an Edit or Addition)Ahmad-reza A. Sadeghi's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Security and privacy challenges in industrial Internet of Things (2015) (751)
- Return-oriented programming without returns (2010) (578)
- Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization (2013) (519)
- Unsafe exposure analysis of mobile in-app advertisements (2012) (508)
- Software Grand Exposure: SGX Cache Attacks Are Practical (2017) (482)
- Privilege Escalation Attacks on Android (2010) (479)
- Property-based attestation for computing platforms: caring about properties, not mechanisms (2004) (453)
- IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT (2016) (442)
- TASTY: tool for automating secure two-party computations (2010) (400)
- Towards Taming Privilege-Escalation Attacks on Android (2012) (397)
- Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications (2015) (357)
- Efficient Privacy-Preserving Face Recognition (2009) (331)
- Stitching the Gadgets: On the Ineffectiveness of Coarse-Grained Control-Flow Integrity Protection (2014) (322)
- Securing the e-health cloud (2010) (313)
- TrustLite: a security architecture for tiny embedded devices (2014) (311)
- Efficient Helper Data Key Extractor on FPGAs (2008) (296)
- ROPdefender: a detection tool to defend against return-oriented programming attacks (2011) (287)
- XManDroid: A New Android Evolution to Mitigate Privilege Escalation Attacks (2011) (286)
- DÏoT: A Federated Self-learning Anomaly Detection System for IoT (2018) (283)
- Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies (2013) (272)
- Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima (2009) (269)
- Twin Clouds: An Architecture for Secure Cloud Computing (2011) (260)
- The Cybersecurity Landscape in Industrial Control Systems (2016) (252)
- PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (2012) (245)
- Readactor: Practical Code Randomization Resilient to Memory Disclosure (2015) (230)
- TyTAN: Tiny trust anchor for tiny devices (2015) (224)
- Security analysis on consumer and industrial IoT devices (2016) (221)
- C-FLAT: Control-Flow Attestation for Embedded Systems Software (2016) (215)
- A protocol for property-based attestation (2006) (204)
- Cryptology and Network Security (2012) (197)
- Practical and lightweight domain isolation on Android (2011) (190)
- Privacy-Preserving ECG Classification With Branching Programs and Neural Networks (2011) (189)
- SEDA: Scalable Embedded Device Attestation (2015) (188)
- TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits (2015) (184)
- Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming (2015) (181)
- HAFIX: Hardware-Assisted Flow Integrity eXtension (2015) (177)
- MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones (2012) (176)
- Peek-a-boo: i see your smart home activities, even encrypted! (2018) (174)
- Reverse Fuzzy Extractors: Enabling Lightweight Mutual Authentication for PUF-Enabled RFIDs (2012) (171)
- Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks (2009) (161)
- Reconfigurable Physical Unclonable Functions - Enabling technology for tamper-resistant storage (2009) (156)
- Token-Based Cloud Computing (2010) (155)
- A Formalization of the Security Features of Physical Functions (2011) (144)
- Losing Control: On the Effectiveness of Control-Flow Integrity under Stack Attacks (2015) (144)
- Hey, My Malware Knows Physics! Attacking PLCs with Physical Model Aware Rootkit (2017) (142)
- Secure Evaluation of Private Linear Branching Programs with Medical Applications (2009) (139)
- AmazonIA: when elasticity snaps back (2011) (130)
- It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks (2015) (129)
- Hardware-assisted fine-grained control-flow integrity: Towards efficient protection of embedded systems against software exploitation (2014) (128)
- Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices (2014) (123)
- SANA: Secure and Scalable Aggregate Network Attestation (2016) (123)
- Zero-Knowledge Watermark Detection and Proof of Ownership (2001) (120)
- NAUTILUS: Fishing for Deep Bugs with Grammars (2019) (119)
- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions (2009) (116)
- Recyclable PUFs: logically reconfigurable PUFs (2011) (114)
- Invited: Things, trouble, trust: On building trust in IoT systems (2016) (114)
- A security framework for the analysis and design of software attestation (2013) (113)
- ASM: A Programmable Interface for Extending Android Security (2014) (113)
- Memristor PUFs: A new generation of memory-based Physically Unclonable Functions (2013) (106)
- HardIDX: Practical and Secure Index with SGX (2017) (102)
- Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM (2013) (102)
- SANCTUARY: ARMing TrustZone with User-space Enclaves (2019) (101)
- Towards Hardware-Intrinsic Security - Foundations and Practice (2010) (101)
- Trusted Computing (2010) (98)
- Twin Clouds: Secure Cloud Computing with Low Latency - (Full Version) (2011) (96)
- AuDI: Toward Autonomous IoT Device-Type Identification Using Periodic Communication (2019) (95)
- Hide and Seek in Time - Robust Covert Timing Channels (2009) (95)
- Property-Based TPM Virtualization (2008) (93)
- The Guard's Dilemma: Efficient Code-Reuse Attacks Against Intel SGX (2018) (93)
- DARPA: Device Attestation Resilient to Physical Attacks (2016) (92)
- Beyond secure channels (2007) (92)
- LO-FAT: Low-Overhead control Flow ATtestation in hardware (2017) (89)
- Coin-Based Anonymous Fingerprinting (1999) (88)
- PUFatt: Embedded platform attestation based on novel processor-based PUFs (2014) (85)
- Leakage-Resilient Layout Randomization for Mobile Devices (2016) (85)
- TCG inside?: a note on TPM specification compliance (2006) (83)
- Secure Multiparty Computation from SGX (2017) (82)
- Automated Synthesis of Optimized Circuits for Secure Computation (2015) (82)
- Electronic Payment Systems (2003) (81)
- Universally Composable Security Analysis of TLS (2008) (78)
- ConXsense: automated context classification for context-aware access control (2013) (77)
- Property-Based Attestation without a Trusted Third Party (2008) (72)
- Practical Secure Evaluation of Semi-Private Functions (2009) (72)
- Mind the GAP: Security & Privacy Risks of Contact Tracing Apps (2020) (71)
- Reconfigurable trusted computing in hardware (2007) (70)
- On the (In)Security of Mobile Two-Factor Authentication (2014) (69)
- Enhancing Grid Security Using Trusted Virtualization (2007) (69)
- Enhancing RFID Security and Privacy by Physically Unclonable Functions (2009) (69)
- CAn't Touch This: Software-only Mitigation against Rowhammer Attacks targeting Kernel Memory (2017) (68)
- ATRIUM: Runtime attestation resilient under memory attacks (2017) (68)
- Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity (2017) (68)
- Breaking e-banking CAPTCHAs (2010) (67)
- Poisoning Attacks on Federated Learning-based IoT Intrusion Detection System (2020) (67)
- Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference (2001) (67)
- PUF-Enhanced RFID Security and Privacy (2010) (66)
- HomeSnitch: behavior transparency and control for smart home IoT devices (2019) (64)
- Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency (2010) (64)
- FastKitten: Practical Smart Contracts on Bitcoin (2019) (64)
- Anonymous Fingerprinting with Direct Non-repudiation (2000) (63)
- Trusted Computing - Special Aspects and Challenges (2008) (62)
- LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution (2018) (60)
- ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices (2018) (60)
- An efficient implementation of trusted channels based on openssl (2008) (60)
- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version) (2010) (59)
- Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing (2007) (59)
- Short paper: lightweight remote attestation using physical functions (2011) (58)
- TIMBER-V: Tag-Isolated Memory Bringing Fine-grained Enclaves to RISC-V (2019) (58)
- A Formal Foundation for the Security Features of Physical Functions (2011) (57)
- Pushing the Communication Barrier in Secure Computation using Lookup Tables (2017) (56)
- A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols (2010) (56)
- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification (2009) (55)
- V0LTpwn: Attacking x86 Processor Integrity from Software (2019) (54)
- SAFELearn: Secure Aggregation for private FEderated Learning (2021) (54)
- On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs (2013) (54)
- Strategy without tactics: Policy-agnostic hardware-enhanced control-flow integrity (2016) (54)
- Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic (2010) (53)
- User Privacy in Transport Systems Based on RFID E-Tickets (2008) (53)
- Remote attestation for low-end embedded devices: The prover's perspective (2016) (53)
- DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization (2017) (53)
- Automated Software Diversity (2015) (52)
- SeED: secure non-interactive attestation for embedded devices (2017) (52)
- IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT (2017) (52)
- Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages (2006) (51)
- CURE: A Security Architecture with CUstomizable and Resilient Enclaves (2020) (51)
- PSiOS: bring your own privacy & security to iOS devices (2013) (51)
- Browser Model for Security Analysis of Browser-Based Protocols (2005) (51)
- PT-Rand: Practical Mitigation of Data-only Attacks against Page Tables (2017) (50)
- HybCache: Hybrid Side-Channel-Resilient Caches for Trusted Execution Environments (2019) (50)
- HardFails: Insights into Software-Exploitable Hardware Bugs (2019) (50)
- IMIX: In-Process Memory Isolation EXtension (2018) (49)
- K-Miner: Uncovering Memory Corruption in Linux (2018) (49)
- Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer (2013) (48)
- Regulating ARM TrustZone Devices in Restricted Spaces (2016) (47)
- VoiceGuard: Secure and Private Speech Processing (2018) (47)
- Secure Data Management in Trusted Computing (2005) (47)
- DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices (2018) (46)
- Trusted Virtual Domains - Design, Implementation and Lessons Learned (2009) (46)
- Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings (2008) (46)
- EDA for secure and dependable cybercars: Challenges and opportunities (2012) (46)
- Proving Ownership of Digital Content (1999) (45)
- Converse PUF-Based Authentication (2012) (45)
- Embedded SFE: Offloading Server and Network Using Hardware Tokens (2010) (45)
- Remanence Decay Side-Channel: The PUF Case (2016) (45)
- E-Passport: The Global Traceability Or How to Feel Like a UPS Package (2006) (44)
- Return-Oriented Programming without Returns on ARM (2010) (43)
- A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design (2013) (43)
- A New Approach for Algebraically Homomorphic Encryption (2008) (42)
- Watermark detection with zero-knowledge disclosure (2003) (42)
- Secure Set Intersection with Untrusted Hardware Tokens (2011) (42)
- DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization (2019) (42)
- Fitness Trackers: Fit for Health but Unfit for Security and Privacy (2017) (41)
- Mobile Trusted Computing (2014) (41)
- Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices (2010) (41)
- Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications (2013) (40)
- Towards a Unified Security Model for Physically Unclonable Functions (2016) (40)
- European Multilateral Secure Computing Base - Open Trusted Computing for You and Me (2004) (40)
- PUF-based secure test wrapper design for cryptographic SoC testing (2012) (39)
- DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems (2019) (39)
- Enabling Fairer Digital Rights Management with Trusted Computing (2007) (39)
- Uni-directional trusted path: Transaction confirmation on just one device (2011) (38)
- A Computational Model for Watermark Robustness (2006) (38)
- SmartTokens: Delegable Access Control with NFC-Enabled Smartphones (2012) (38)
- FLAME: Taming Backdoors in Federated Learning (2021) (38)
- Anonymizer-Enabled Security and Privacy for RFID (2009) (38)
- Taming "Trusted Platforms" by Operating System Design (2003) (38)
- FLGUARD: Secure and Private Federated Learning (2021) (37)
- State-aware anomaly detection for industrial control systems (2018) (36)
- Towards automated security policy enforcement in multi-tenant virtual data centers (2010) (36)
- Alexa Lied to Me: Skill-based Man-in-the-Middle Attacks on Virtual Assistants (2019) (35)
- Provably secure browser-based user-aware mutual authentication over TLS (2008) (35)
- From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design (2010) (34)
- Breaking Fitness Records Without Moving: Reverse Engineering and Spoofing Fitbit (2017) (34)
- Compacting privacy-preserving k-nearest neighbor search using logic synthesis (2015) (34)
- Offline Model Guard: Secure and Private ML on Mobile Devices (2020) (34)
- Flexible patient-controlled security for electronic health records (2012) (34)
- Selfrando: Securing the Tor Browser against De-anonymization Exploits (2016) (34)
- Invited: Can IoT be secured: Emerging challenges in connecting the unconnected (2016) (33)
- Security Analysis of Mobile Two-Factor Authentication Schemes (2014) (33)
- Efficient privacy-preserving classification of ECG signals (2009) (33)
- Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions (2014) (33)
- Secure object identification: or: solving the Chess Grandmaster Problem (2003) (32)
- Advanced techniques for dispute resolving and authorship proofs on digital works (2003) (31)
- TruWallet: trustworthy and migratable wallet-based web authentication (2009) (31)
- Phishing Phishers - Observing and Tracing Organized Cybercrime (2007) (31)
- Optimized Self-Synchronizing Mode of Operation (2001) (31)
- JITGuard: Hardening Just-in-time Compilers with SGX (2017) (31)
- Anonymous Authentication with TLS and DAA (2010) (29)
- Flexible and secure enterprise rights management based on trusted virtual domains (2008) (29)
- A Privacy-Protecting Coupon System (2005) (28)
- Methanol treatment in gas condensate reservoirs: A modeling and experimental study (2014) (28)
- Trusted Execution Environments: Properties, Applications, and Challenges (2020) (28)
- GarbledCPU: A MIPS processor for secure computation in hardware (2016) (28)
- Client-Controlled Cryptography-as-a-Service in the Cloud (2013) (28)
- US-AID: Unattended Scalable Attestation of IoT Devices (2018) (27)
- Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure (2002) (27)
- Impossibility Results for RFID Privacy Notions (2010) (27)
- hPIN/hTAN: A Lightweight and Low-Cost E-Banking Solution against Untrusted Computers (2011) (27)
- Automatic Generation of Sound Zero-Knowledge Protocols (2008) (27)
- Revisiting Context-Based Authentication in IoT (2018) (27)
- Combining Tardos Fingerprinting Codes and Fingercasting (2007) (26)
- How to Combine Homomorphic Encryption and Garbled Circuits - Improved Circuits and Computing the Minimum Distance Efficiently (2009) (26)
- CAn't Touch This: Practical and Generic Software-only Defenses Against Rowhammer Attacks (2016) (25)
- Overcoming the obstacles of zero-knowledge watermark detection (2004) (25)
- A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting (2007) (25)
- A Forensic Framework for Tracing Phishers (2007) (25)
- On the Security of PAS (Predicate-Based Authentication Service) (2009) (24)
- On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving (2003) (24)
- Linkable Democratic Group Signatures (2006) (24)
- Control Behavior Integrity for Distributed Cyber-Physical Systems (2018) (24)
- Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets (2013) (24)
- Trustworthy Clouds Underpinning the Future Internet (2011) (24)
- You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks (2014) (24)
- Proving a WS-federation passive requestor profile with a browser model (2005) (24)
- Secure Software Delivery and Installation in Embedded Systems (2005) (23)
- On RFID Privacy with Mutual Authentication and Tag Corruption (2010) (23)
- Anonymous Authentication for RFID Systems (2010) (23)
- Lightweight Remote Attestation Using Physical Functions (2011) (23)
- Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels (2009) (22)
- Enabling the Application of Open Systems like PCs for Online Voting (2006) (22)
- A trusted versioning file system for passive mobile storage devices (2014) (22)
- Subversive-C: Abusing and Protecting Dynamic Message Dispatch (2016) (22)
- DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (Short Paper) (2016) (22)
- Improved Security Notions and Protocols for Non-transferable Identification (2008) (21)
- CrowdShare: Secure Mobile Resource Sharing (2013) (21)
- The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs (2012) (21)
- DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection (2022) (20)
- PAtt: Physics-based Attestation of Control Systems (2019) (20)
- HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement (2017) (20)
- Video Streaming Forensic - Content Identification with Traffic Snooping (2010) (20)
- Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure Software Update Distribution over Untrusted Cache-enabled Networks (2014) (19)
- Transparent Mobile Storage Protection in Trusted Virtual Domains (2009) (19)
- Smart and Secure Cross-Device Apps for the Internet of Advanced Things (2015) (19)
- XiOS: Extended Application Sandboxing on iOS (2015) (19)
- LAZARUS: Practical Side-Channel Resilient Kernel-Space Randomization (2017) (19)
- I Know Where You are: Proofs of Presence Resilient to Malicious Provers (2015) (19)
- Patterns for Secure Boot and Secure Storage in Computer Systems (2010) (19)
- Non-interactive Watermark Detection for a Correlation-Based Watermarking Scheme (2005) (18)
- An Open Approach for Designing Secure Electronic Immobilizers (2005) (18)
- The Marriage of Cryptography and Watermarking - Beneficial and Challenging for Secure Watermarking and Detection (2008) (18)
- Advances and throwbacks in hardware-assisted security: special session (2018) (17)
- Twin Clouds: Secure Cloud Computing with (2011) (17)
- Self-Escrowed Cash against User Blackmailing (2000) (17)
- A practical property-based bootstrap architecture (2009) (17)
- TruWalletM: Secure Web Authentication on Mobile Platforms (2010) (17)
- LeakyPick: IoT Audio Spy Detector (2020) (17)
- Extending IPsec for Efficient Remote Attestation (2010) (17)
- Location Privacy in RFID Applications (2009) (17)
- Securing the Access to Electronic Health Records on Mobile Phones (2011) (16)
- Bridging the Gap between TCPA/Palladium and Personal Security (2003) (16)
- Trusted virtual domains: Color your network (2010) (16)
- Security Architecture for Device Encryption and VPN (2006) (16)
- SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles (2016) (16)
- Breaking Randomized Linear Generation Functions Based Virtual Password System (2010) (15)
- Automatic Generation of Sigma-Protocols (2009) (15)
- End-to-End Detection of Caller ID Spoofing Attacks (2016) (15)
- Towards a Framework for Android Security Modules: Extending SE Android Type Enforcement to Android Middleware (2012) (15)
- RIP-RH: Preventing Rowhammer-based Inter-Process Attacks (2019) (15)
- Towards multilaterally secure computing platforms - with open source and trusted computing (2005) (15)
- ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep Neural Network and Transfer Learning (2021) (15)
- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems (2008) (15)
- myTunes: Semantically Linked and User-Centric Fine-Grained Privacy Control on Android (2012) (15)
- Trusted Privacy Domains - Challenges for Trusted Computing in Privacy-Protecting Information Sharing (2009) (14)
- On Constructing Homomorphic Encryption Schemes from Coding Theory (2011) (14)
- ARM2GC: Succinct Garbled Processor for Secure Computation (2019) (14)
- Special Session: Advances and Throwbacks in Hardware-Assisted Security (2018) (14)
- Phonion: Practical Protection of Metadata in Telephony Networks (2017) (14)
- Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers (2008) (14)
- Swap and Play: Live Updating Hypervisors and Its Application to Xen (2014) (14)
- Play it once again, Sam - Enforcing Stateful Licenses on Open Platforms (2006) (14)
- HEALED: HEaling & Attestation for Low-End Embedded Devices (2019) (13)
- Towards multilateral secure digital rights distribution infrastructures (2005) (13)
- Resettable and Non-Transferable Chip Authentication for E-Passports (2008) (13)
- DIoT: A Self-learning System for Detecting Compromised IoT Devices (2018) (13)
- A Pattern for Secure Graphical User Interface Systems (2009) (13)
- Towards Systematic Design of Collective Remote Attestation Protocols (2019) (13)
- A Demonstrative Ad Hoc Attestation System (2008) (12)
- Secure Multi-Coupons for Federated Environments: Privacy-Preserving and Customer-Friendly (2008) (12)
- Mobile Platform Security (2013) (12)
- MoP-2-MoP - Mobile Private Microblogging (2014) (12)
- How to Break a Semi-anonymous Fingerprinting Scheme (2001) (12)
- Taming "Trusted Computing" by Operating System Design (2003) (11)
- Softer Smartcards - Usable Cryptographic Tokens with Secure Execution (2012) (11)
- Reconciling remote attestation and safety-critical operation on simple IoT devices (2018) (11)
- Towards Trustworthy Online Voting (2006) (11)
- Poster: practical embedded remote attestation using physically unclonable functions (2011) (11)
- Modular Design of Efficient Secure Function Evaluation Protocols (2010) (11)
- The Continuing Arms Race: Code-Reuse Attacks and Defenses (2018) (11)
- Financial Cryptography and Data Security (2013) (11)
- Sokrates - A Compiler Framework for Zero-Knowledge Protocols (2005) (11)
- XIFER: A Software Diversity Tool Against Code-Reuse Attacks (2012) (11)
- It’s Hammer Time: How to Attack (Rowhammer-based) DRAM-PUFs (2018) (11)
- CryptoML: Secure outsourcing of big data machine learning applications (2016) (11)
- On the Design and Implementation of Ecient Zero-Knowledge Proofs of Knowledge (2009) (10)
- Poster: the quest for security against privilege escalation attacks on android (2011) (10)
- HardScope: Hardening Embedded Systems Against Data-Oriented Attacks (2019) (10)
- HardIDX: Practical and secure index with SGX in a malicious environment (2018) (10)
- Private auctions with multiple rounds and multiple items (2002) (10)
- Machiavelli Confronts 21st Century Digital Technology: Democracy in a Network Society (2009) (10)
- Toward Practical Secure Stable Matching (2017) (10)
- Anti-theft Protection: Electronic Immobilizers (2006) (10)
- Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (2017) (9)
- Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? (2015) (9)
- Secure VPNs for Trusted Computing Environments (2009) (9)
- Trustworthy AI Inference Systems: An Industry Research View (2020) (9)
- Key Attestation from Trusted Execution Environments (2010) (9)
- Universally Composable Security Analysis of TLS - Secure Sessions with Handshake and Record Layer Protocols (2008) (9)
- Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices (2018) (8)
- Keynote: Internet of Things or Threats? On Building Trust in IoT (2018) (8)
- Efficient RFID Security and Privacy with Anonymizers (2009) (8)
- On primitivity tests for polynomials (1998) (8)
- Trusted Configuration in Cloud FPGAs (2021) (8)
- Radio Frequency Identification: Security and Privacy Issues (2014) (8)
- A Non-Sequential Unsplittable Privacy-Protecting Multi-Coupon Scheme (2007) (8)
- Tetherway: a framework for tethering camouflage (2012) (8)
- Towards Multilateral-Secure DRM Platforms (2005) (7)
- Future of Trust in Computing (2009) (7)
- TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities (2022) (7)
- Contact Tracing by Giant Data Collectors: Opening Pandora’s Box of Threats to Privacy, Sovereignty and National Security (2020) (7)
- CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm (2012) (7)
- Complementing zero-knowledge watermark detection: Proving properties of embedded information without revealing it (2005) (7)
- OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices (2015) (7)
- Technical Report: DroidAuditor: Forensic Analysis of Application-Layer Privilege Escalation Attacks on Android (2016) (7)
- Property-Based Broadcast Encryption for Multi-level Security Policies (2005) (7)
- Securing Peer-to-Peer Distributions for Mobile Devices (2008) (7)
- FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants (2021) (6)
- A Security Architecture for Accessing Health Records on Mobile Phones (2011) (6)
- Establishing Chain of Trust in Reconfigurable Hardware (2007) (6)
- Mobile security and privacy: the quest for the mighty access control (2013) (6)
- Final Report on Verification and Assessment (2002) (6)
- Over-the-air Cross-Platform Infection for Breaking mTAN-based Online Banking Authentication (2012) (6)
- Building Secure Defenses Against Code-Reuse Attacks (2015) (6)
- AUDI: Towards Autonomous IoT Device-Type Identification (2019) (6)
- Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society (2013) (6)
- INVITED: In Hardware We Trust : Gains and Pains of Hardware-assisted Security (2019) (6)
- Modeling Attack Resilient Reconfigurable Latent Obfuscation Technique for PUF based Lightweight Authentication (2017) (6)
- SCIoT: A Secure and sCalable End-to-End Management Framework for IoT Devices (2018) (6)
- Execution Integrity with In-Place Encryption (2017) (5)
- POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments (2016) (5)
- SandBlaster: Reversing the Apple Sandbox (2016) (5)
- Financial cryptography and data security : 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, revised selected papers (2013) (5)
- PUF-PRFs : A New Tamper-resilient Cryptographic Primitive (2009) (5)
- SoK: Secure FPGA Multi-Tenancy in the Cloud: Challenges and Opportunities (2021) (5)
- Market-Driven Code Provisioning to Mobile Secure Hardware (2015) (5)
- Software distribution as a malware infection vector (2009) (5)
- SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud (2020) (5)
- Embedding Trust into Cars—Secure Software Delivery and Installation (2005) (5)
- Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version) (2010) (5)
- iOracle: Automated Evaluation of Access Control Policies in iOS (2018) (5)
- HomeSnitch (2019) (5)
- Secure fingerprinting on sound foundations (2003) (4)
- First Summary Report on Asymmetric Watermarking (2005) (4)
- Challenges for Cryptology Research in Europe for 2007-2013 and beyond (2006) (4)
- GhostTouch: Targeted Attacks on Touchscreens without Physical Touch (2022) (4)
- Sustainable Security & Safety: Challenges and Opportunities (2019) (4)
- Chunked-Cache: On-Demand and Scalable Cache Isolation for Security Architectures (2021) (4)
- Regulating Smart Personal Devices in Restricted Spaces (2015) (4)
- Baseline functionality for security and control of commodity IoT devices and domain-controlled device lifecycle management (2018) (4)
- ConXsense - Context Sensing for Adaptive Usable Access Control (2013) (4)
- YACZK: Yet Another Compiler for Zero-Knowledge (Poster Abstract) (2010) (4)
- FedCRI: Federated Mobile Cyber-Risk Intelligence (2022) (4)
- Hardware control flow integrity (2018) (4)
- Using Compilers to Enhance Cryptographic Product Development (2009) (4)
- Cryptology and Network Security — CANS 2012 (2012) (4)
- Cloud Computing Security: Foundations and Research Directions (2022) (4)
- How far removed are you?: scalable privacy-preserving estimation of social path length with Social PaL (2014) (4)
- Poster: control-flow integrity for smartphones (2011) (4)
- Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (2010) (4)
- Privacy-preserving speech processing via STPC and TEEs (Poster) (2019) (3)
- Developing Privacy-preserving AI Systems: The Lessons learned (2020) (3)
- Die digitale Signatur (2003) (3)
- Towards Provably Secure Software Attestation (2013) (3)
- Practical Smart Contracts on Bitcoin (2019) (3)
- Long Live Randomization: On Privacy-preserving Contact Tracing in Pandemic (2020) (3)
- In Hardware We Trust (2019) (3)
- Efficient Implementation of Zero-Knowledge Proofs for Watermark Detection in Multimedia Data (2006) (3)
- Exploiting PUF Models for Error Free Response Generation (2017) (3)
- Organizing The World's Largest Hardware Security Competition: Challenges, Opportunities, and Lessons Learned (2021) (3)
- Close the Gate: Detecting Backdoored Models in Federated Learning based on Client-Side Deep Layer Output Analysis (2022) (3)
- With Great Complexity Comes Great Vulnerability: From Stand-Alone Fixes to Reconfigurable Security (2020) (3)
- LegIoT: Ledgered Trust Management Platform for IoT (2020) (3)
- OmniShare: Encrypted Cloud Storage for the Multi-Device Era (2018) (3)
- Five Freedoms for the Homo Deus (2018) (3)
- Internet of things or threats?: on building trust in IoT (keynote) (2018) (3)
- LiteHAX (2018) (3)
- Special Session: The Future of IoT Security (2018) (3)
- Guest Editorial Special Section on Hardware Security and Trust (2015) (3)
- Efficient Privacy-Preserving Face Recognition ( Full Version ) ? (2009) (3)
- Physical Security Bounds Against Tampering (2006) (3)
- Physically Unclonable Functions (2015) (3)
- Digital Contact Tracing Solutions: Promises, Pitfalls and Challenges (2022) (3)
- Blockchain and the Future of Publishing (2019) (2)
- Towards a Cloud-based System for Software Protection and Licensing (2018) (2)
- CHASE: A Configurable Hardware-Assisted Security Extension for Real-Time Systems (2019) (2)
- Towards Multicolored Computing - Compartmented Security to Prevent Phishing Attacks (2006) (2)
- RealSWATT: Remote Software-based Attestation for Embedded Devices under Realtime Constraints (2021) (2)
- Towards Hardware-Intrinsic Security - ReadingSample (2017) (2)
- SAFE: A Secure and Efficient Long-Term Distributed Storage System (2020) (2)
- POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs (2016) (2)
- Financial Cryptography and Data Security 2017 (2017) (2)
- On Offline Payments with Bitcoin (Poster Abstract) (2014) (2)
- Privacy and Security in Smart Energy Grids (Dagstuhl Seminar 11511) (2011) (2)
- ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping (2017) (2)
- Security Engineering for Zero-knowledge Watermark Detection (2005) (2)
- Building Control-Flow Integrity Defenses (2015) (2)
- Trusted Container Extensions for Container-based Confidential Computing (2022) (2)
- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers (2010) (2)
- Revisiting Context-Based Pairing in IoT (2018) (2)
- Trust and Trustworthy Computing, Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010. Proceedings (2010) (2)
- Design and Implementation of a Secure Linux Device Encryption Architecture (2006) (2)
- When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs (2018) (2)
- RiscyROP: Automated Return-Oriented Programming Attacks on RISC-V and ARM64 (2022) (2)
- Invited - Can IoT be secured: emerging challenges in connecting the unconnected (2016) (2)
- WIGHT: Wired Ghost Touch Attack on Capacitive Touchscreens (2022) (2)
- Ask Your E-Doctor Without Telling: Privacy-Preserving Medical Diagnostics (Poster) (2009) (2)
- Enclave Computing on RISC-V: A Brighter Future for Security? (2020) (2)
- Changing the Game of Software Security (2018) (2)
- SAFELearn: Secure Aggregation for private FEderated Learning (Full Version) (2021) (2)
- Identification Protocols Revisited - Episode I: E-Passports (2008) (1)
- MediTrust: Secure Client Systems for Healthcare IT to Protect Sensitive Data of Patients (2011) (1)
- Enhancing Security of Computing Platforms with TC-Technology (2004) (1)
- The future of IoT security: special session (2018) (1)
- Return to Where? You Can't Exploit What You Can't Find (2015) (1)
- Towards a Policy-Agnostic Control-Flow Integrity Implementation (2016) (1)
- Combining Signal Processing and Cryptographic Protocol Design for Efficient ECG Classification (2009) (1)
- Security & Privacy Week Interviews, Part 3 (2017) (1)
- Towards Multilateral Security On DRM Platforms (2005) (1)
- SADAN: Scalable Adversary Detection in Autonomous Networks (2019) (1)
- On the Security of Strong Memristor-based Physically Unclonable Functions (2020) (1)
- CFI Goes Mobile: Control-Flow Integrity for Smartphones (2011) (1)
- Games without Frontiers: Whither Information Security and Privacy? (2016) (1)
- CATT: Practical and Generic Software-only Defenses Against Rowhammer Attacks (2016) (1)
- The rise, fall and reincarnation of trusted computing (2012) (1)
- New Aspects on Trusted Computing - New and Advanced Possibilities to Improve Security and Privacy (2005) (1)
- Enhancing Grid Security Using Trusted Virtualization 1 (2007) (1)
- The Beast is in Your Memory: Return-Oriented Programming Attacks Against Modern Control-Flow Integrity Protection Techniques (2014) (1)
- Guest Editors' Introduction: Secure Automotive Systems (2019) (1)
- 2 . 3 . 6 Electronic Payment Systems (2003) (1)
- Location Privacy in RFID Systemen (2011) (1)
- Compartmented Security for Browsers (2007) (1)
- Information Hiding, 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers (2009) (1)
- Breaking a Virtual Password System Based on Randomized Linear Generation Functions (2010) (1)
- CFInsight: A Comprehensive Metric for CFI Policies (2022) (1)
- : Practical Protection of Metadata in Telephony Networks (2016) (1)
- VirTEE: a full backward-compatible TEE with native live migration and secure I/O (2022) (1)
- Proceedings of the 1st international conference on Trusted Computing and Trust in Information Technologies: Trusted Computing - Challenges and Applications (2008) (1)
- Property-based taming of lying mobile nodes (2006) (1)
- Hardware-Assisted Security: Promises, Pitfalls and Opportunities (2017) (1)
- Challenges for Trusted Computing (2006) (1)
- Proceedings of the 3rd International Workshop on Trustworthy Embedded Devices : publication of: Conference CCS'13 2013 ACM SIGSAC; November 04 - 08, 2013, Berlin, Germany (2013) (1)
- Browser-based Authentication Protocols for Naive Users (2007) (1)
- Trust and Trustworthy Computing : 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011. Proceedings (2011) (1)
- POSTER: PUF-based Secure Test Wrapper for Cryptographic SoC (2012) (1)
- PROVI . 1 First Summary Report on Two-Party Protocols (2005) (1)
- Lightweight Remote Attestation using Physical Functions (Extended Version) (2011) (1)
- Follow Us and Become Famous! Insights and Guidelines From Instagram Engagement Mechanisms (2023) (1)
- Physical Security Primitives - A Survey on Physically Unclonable Functions and PUF-Based Security Solutions (2014) (1)
- BayBFed: Bayesian Backdoor Defense for Federated Learning (2023) (1)
- INVITED: AI Utopia or Dystopia - On Securing AI Platforms (2020) (1)
- Building Code Randomization Defenses (2015) (0)
- HardScope (2019) (0)
- Wireless and Mobile Security Research and Teaching in the Post-Pandemic World (2022) (0)
- Execute-Only Attacks against Execute-Only Defenses (2015) (0)
- It's hammer time: how to attack (rowhammer-based) DRAM-PUFs (2018) (0)
- Trust and Trustworthy Computing (2011) (0)
- Security a Privacy Week Interviews, Part 1 (2016) (0)
- Secure Computing in the Cloud (Dagstuhl Seminar 11491) (2011) (0)
- POSTER. Bitcoin2Go: Secure Offline and Fast Payments with Bitcoins (2014) (0)
- CTL: A Platform-Independent Crypto Tools Library Based on Dataow Programming Paradigm (Extended Edition) ? (2012) (0)
- Trusted Computing: Whom do we trust? Building Open Multilateral Secure Platforms Based On Trusted Computing (2005) (0)
- Information Security Solutions Europe - ISSE 2010 (2010) (0)
- Proceedings of the ACM Conference on Computer and Communications Security: Foreword (2013) (0)
- The Industrial Control Systems Cyber Security Landscape (2016) (0)
- Session details: Security and privacy issues in V2X communication (2013) (0)
- SOCIAL EXCLUSION OF WOMEN IN POOR RURAL AREAS OF IRAN: THE CASE OF MALARD VILLAGES IN SHAHRYAR, TEHRAN PROVINCE (2010) (0)
- HAFIX: Hardware-Assisted Flow Integrity Extension (Best Paper Award) (2015) (0)
- Auctions with Multiple Rounds and Multiple Items (2002) (0)
- Distribution Malware Infection Vector (2007) (0)
- Towards a Cloud-based System for Software Protection and Licensing. (2018) (0)
- ACM WiSec 2013 welcome message (2013) (0)
- IoT Security Service Device-Type Identification Anomaly Detection Models IoT deviceIoT device IoT deviceIoT device IoT device Device Fingerprinting Anomaly Detection WiFi Ethernet IoT deviceIoT device IoT device Local SOHO network Botnet server Security Gateway Infected IoT device Infected IoT devic (2018) (0)
- SWARM ATTESTATION 2 . 1 Problem Description and System Model (2015) (0)
- GrandDetAuto: Detecting Malicious Nodes in Large-Scale Autonomous Networks (2021) (0)
- Oops..! I Glitched It Again! How to Multi-Glitch the Glitching-Protections on ARM TrustZone-M (2023) (0)
- Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks (2014) (0)
- Technical perspective: The real-world dilemma of security and privacy by design (2021) (0)
- Physically Unclonable Functions (PUFs) (2015) (0)
- Background and Evolution of Code-Reuse Attacks (2015) (0)
- Simplified Hardness Proofs in the Generic Group Model (2005) (0)
- Trusting the trust anchor: towards detecting cross-layer vulnerabilities with hardware fuzzing (2022) (0)
- Security & Privacy Week Interviews, Part 3 (2016) (0)
- European Centre for IT-Security ( eurobits ) 1 European Multilateral Secure Computing Base Open Trusted Computing for You and (2004) (0)
- POSTER: Secure Smartphone-based NFC-enabled Car Immobilizer (an outstanding poster award) (2013) (0)
- Cybersecurity and Machine Learning Vision Document (2021) (0)
- POSTER : Toward a Secure and Scalable Attestation [ Extended Abstract ] (2016) (0)
- The Quest for Security in Integrated Networks (2003) (0)
- 09282 Executive Summary - Foundations for Forgery-Resilient Cryptographic Hardware (2009) (0)
- SafeTEE: Combining Safety and Security on ARM-based Microcontrollers (2022) (0)
- Basics of Secure Computing (2011) (0)
- ACM CCS 2016 Interviews, Part 1 (2017) (0)
- Key Agreement for Heterogeneous Ad-Hoc Groups (2006) (0)
- Security and Privacy More Crucial than Ever (2017) (0)
- Second Summary Report on Multiparty Protocols Second Summary Report on Multiparty Protocols (2006) (0)
- Session details: Session 5B -- Hardware Security (2014) (0)
- SEDA - Technical Report (2015) (0)
- POSE: Practical Off-chain Smart Contract Execution (2022) (0)
- Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning (2023) (0)
- Improving The Security Of Watermarking Schemes With Cryptographic Techniques (2004) (0)
- AuthentiSense: A Scalable Behavioral Biometrics Authentication Scheme using Few-Shot Learning for Mobile Platforms (2023) (0)
- Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization (2016) (0)
- Physically Unclonable Pseudorandom Functions (2009) (0)
- A property based attestation system uses a zero knowledge proof to attest to the integrity of a TPM equipped computing device without disclosing configuration (2007) (0)
- Trusted embedded System Operating System (TeSOS) - Study and Design (2011) (0)
- HyPFuzz: Formal-Assisted Processor Fuzzing (2023) (0)
- ACM CCS 2016 Interviews, Part 2 (2017) (0)
- Advanced Attacks and Protection Mechanisms in IoT Devices and Networks (2021) (0)
- TUD-CS-2013-0084 CrowdShare : Secure Mobile Resource Sharing (2015) (0)
- In Hardware We Trust? From TPM to Enclave Computing on RISC-V (2021) (0)
- ARGUS: Context-Based Detection of Stealthy IoT Infiltration Attacks (2023) (0)
- Client Authentication in Federations Using a Security Mode (2006) (0)
- Applied Cryptography and Network Security (2016) (0)
- POSTER: Toward a Secure and Scalable Attestation (2016) (0)
- Revisiting Context-Based Authentication in IoT To appear at 55 th Design Automation Conference ( DAC ) , San Francisco , June 2018 (2018) (0)
- Physical System ( Power Grid ) Central Control HMI Operator Sensor / Actuator HMI : Human-Machine Interface (2016) (0)
- STC 2011 chairs' welcome (2011) (0)
- Future of Assurance: Ensuring that a System is Trustworthy (2009) (0)
- MODELING AND DESIGN OF A CONTROLLER FOR MECHANICAL COUPLING OF TWO DIFFERENT ELECTRIC MOTORS TO ENHANCE THE PERFORMANCE OF SUBMARINE’S MOTION SYSTEM (2010) (0)
- Execute-Only Attacks against Execute-Only Defenses1 (2015) (0)
- TruSat: Building Cyber Trust in Collaborative Spacecraft Networks (2022) (0)
- Distributed Memory Guard: Enabling Secure Enclave Computing in NoC-based Architectures (2021) (0)
- THE STUDY OF TARGET GROUPS IN EIGHTH PARLIAMENT ELECTION CAMPAIGN IN TEHRAN (2009) (0)
- Security & Privacy Week Interviews, Part 2 (2016) (0)
- ACM CCS 2016 Interview, Part 3 (2017) (0)
- Trusted User-Aware Web Authentication (2007) (0)
- Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks (2013) (0)
- Summary Report on Models and Definitions for Cryptographic Protocols Summary Report on Models and Definitions for Cryptographic Protocols (2008) (0)
- Guest Editors' Introduction: Competing to Secure SoCs (2021) (0)
- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk) (2010) (0)
- First Summary Report on Multiparty Protocols First Summary Report on Multiparty Protocols D.provi.2 — First Summary Report on Multiparty Protocols (2005) (0)
- To ChatGPT, or not to ChatGPT: That is the question! (2023) (0)
- Privacy-Preserving Medical Diagnostics (2009) (0)
- HardScope : Thwarting DOP attacks with Hardware-assisted Run-time Scope Enforcement (2018) (0)
- Sufficient Conditions for the Computational Intractability of Generic Group Problems (2008) (0)
- On Offline Payments with Bitcoin (2014) (0)
- Jump Attacks on Android’s ARM (2010) (0)
- Proceedings of the 3rd international conference on Trust and trustworthy computing (2010) (0)
- Extending IPsec for E cient Remote Attestation (2010) (0)
- Secure Set Intersection with Untrusted Hardware Tokens (Full Version) (2011) (0)
- Mobile Trusted Computing This paper surveys the trusted computing features in mobile computing platforms. (2014) (0)
- Session details: Panel: Security Challenges in SoC Design (2021) (0)
- Proceedings of the International Conference on Cryptology and Network Security [Lecture Notes in Computer Science, Volume 7712] (2012) (0)
- IoT Cloud Service Device-type Identification Policy Database IoT deviceIoT deviceIoT deviceIoT device IoT device Device Fingerprinting Policy Application WiFi Ethernet IoT deviceIoT device IoT device Local SOHO network IoT Gateway Internet (2019) (0)
- DARWIN: Survival of the Fittest Fuzzing Mutators (2022) (0)
- A Generic Transformation from Symmetric to Asymmetric Broadcast Encryption (2006) (0)
- Towards Secure Computing Platforms with Open-Source and Trusted Computing (2005) (0)
- Sufficient Conditions for Computational Intractability Regarding Generic Algorithms (2007) (0)
- Moving Targets vs. Moving Adversaries: On the Effectiveness of System Randomization (2017) (0)
- SUPERCLOUD Architecture Specification (2015) (0)
- CyCAR'2013: first international academic workshop on security, privacy and dependability for cybervehicles (2013) (0)
- iOracle (2018) (0)
- Invited: Security Beyond Bulk Silicon: Opportunities and Challenges of Emerging Devices (2021) (0)
- Just-In-Time Code Reuse: the More Things Change, the More They Stay the Same (2013) (0)
- POSTER: Phonion: Frustrating Telephony Metadata Analysis (2016) (0)
- VirTEE (2022) (0)
- POSTER: On Offline Payments with Bitcoin (2014) (0)
- 4 6 7 3 5 Return to next sequence 2 Stack pointer Move 1 Code Program Memory Return Return Libraries ( lib ) Instruction Sequence Instruction Sequence Data Return (2010) (0)
- Proceedings of the 11th annual ACM workshop on Digital rights management (2011) (0)
- Trusted Computing—State of the Art and Challenges (2008) (0)
- HGI-TR-2008-001 Property-Based TPM Virtualization (2008) (0)
- V'CER: Efficient Certificate Validation in Constrained Networks (2022) (0)
- 09282 Abstracts Collection - Foundations for Forgery-Resilient Cryptographic Hardware (2009) (0)
- The Internet of Beasty Things: Challenges in Embedded Systems (2015) (0)
- Proceedings of the 3rd international workshop on Trustworthy embedded devices (2013) (0)
- Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles (2013) (0)
- Browser Models for Usable Authentication Protocols (2007) (0)
- Multilaterally Secure Computing Platforms - in your office, car and at home (2005) (0)
This paper list is powered by the following services: