Login / Signup
TrustED@CCS
2013
2016
2013
2016
Keyphrases
Publications
2016
David F. Oswald
Wireless Attacks on Automotive Remote Keyless Entry Systems.
TrustED@CCS
(2016)
Marcel Medwed
IoT Security Challenges and Ways Forward.
TrustED@CCS
(2016)
Naoya Torii
,
Dai Yamamoto
,
Tsutomu Matsumoto
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs.
TrustED@CCS
(2016)
Ethan Gaebel
,
Ning Zhang
,
Wenjing Lou
,
Y. Thomas Hou
Looks Good To Me: Authentication for Augmented Reality.
TrustED@CCS
(2016)
Andrei Costin
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations.
TrustED@CCS
(2016)
Aurélien Francillon
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?
TrustED@CCS
(2016)
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016
TrustED@CCS
(2016)
Christopher Huth
,
René Guillaume
,
Paul Duplys
,
Kumaragurubaran Velmurugan
,
Tim Güneysu
On the Energy Cost of Channel Based Key Agreement.
TrustED@CCS
(2016)
Matthias Hiller
,
Aysun Gurur Önalan
,
Georg Sigl
,
Martin Bossert
Online Reliability Testing for PUF Key Derivation.
TrustED@CCS
(2016)
Markus Dürmuth
,
David F. Oswald
,
Niklas Pastewka
Side-Channel Attacks on Fingerprint Matching Algorithms.
TrustED@CCS
(2016)
2015
Jan Nordholz
,
Julian Vetter
,
Michael Peter
,
Matthias Junker-Petschick
,
Janis Danisevskis
XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM.
TrustED@CCS
(2015)
Alexandra Mikityuk
,
Stefan Pham
,
Stefan Kaiser
,
Oliver Friedrich
,
Stefan Arbanowski
Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI Environments.
TrustED@CCS
(2015)
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015
TrustED@CCS
(2015)
André Schaller
,
Boris Skoric
,
Stefan Katzenbeisser
On the Systematic Drift of Physically Unclonable Functions Due to Aging.
TrustED@CCS
(2015)
Yang Xie
,
Chongxi Bao
,
Ankur Srivastava
Security-Aware Design Flow for 2.5D IC Technology.
TrustED@CCS
(2015)
Jakub Szefer
Leveraging Processor Performance Counters for Security and Performance.
TrustED@CCS
(2015)
Marten van Dijk
Hardware Security and its Adversaries.
TrustED@CCS
(2015)
André Weimerskirch
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches.
TrustED@CCS
(2015)
Ryan A. Scheel
,
Akhilesh Tyagi
Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication.
TrustED@CCS
(2015)
Xin Ye
,
Mostafa Taha
,
Cong Chen
,
Thomas Eisenbarth
Faster Leakage Detection and Exploitation.
TrustED@CCS
(2015)
Geremy Condra
A Plea for Incremental Work in IoT Security.
TrustED@CCS
(2015)
2014
Ahmad-Reza Sadeghi
,
Lucas Davi
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks.
TrustED@CCS
(2014)
Thomas Nyman
,
Jan-Erik Ekberg
,
N. Asokan
Citizen Electronic Identities using TPM 2.0.
TrustED@CCS
(2014)
Shijun Zhao
,
Qianying Zhang
,
Guangyao Hu
,
Yu Qin
,
Dengguo Feng
Providing Root of Trust for ARM TrustZone using On-Chip SRAM.
TrustED@CCS
(2014)
Konrad-Felix Krentz
,
Gerhard Wunder
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity.
TrustED@CCS
(2014)
Chongxi Bao
,
Ankur Srivastava
A Secure Algorithm for Task Scheduling against Side-channel Attacks.
TrustED@CCS
(2014)
Markku-Juhani Olavi Saarinen
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor.
TrustED@CCS
(2014)
Yier Jin
Embedded System Security in Smart Consumer Electronics.
TrustED@CCS
(2014)
Gene Tsudik
Challenges in Remote Attestation of Low-End Embedded Devices.
TrustED@CCS
(2014)
Christof Paar
How to Build Hardware Trojans.
TrustED@CCS
(2014)
Tiffany Hyun-Jin Kim
Challenges of Establishing Trust in Online Entities and Beyond.
TrustED@CCS
(2014)
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014
TrustED@CCS
(2014)
2013
Syed Taha Ali
,
Vijay Sivaraman
,
Diethelm Ostry
,
Sanjay K. Jha
Securing data provenance in body area networks using lightweight wireless link fingerprints.
TrustED@CCS
(2013)
TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany
TrustED@CCS
(2013)
Robbert van den Berg
,
Boris Skoric
,
Vincent van der Leest
Bias-based modeling and entropy analysis of PUFs.
TrustED@CCS
(2013)
Anthony Van Herrewege
,
Vincent van der Leest
,
André Schaller
,
Stefan Katzenbeisser
,
Ingrid Verbauwhede
Secure PRNG seeding on commercial off-the-shelf microcontrollers.
TrustED@CCS
(2013)
Christian Boit
,
Clemens Helfmeier
,
Dmitry Nedospasov
Feasibly clonable functions.
TrustED@CCS
(2013)
Xinxin Fan
,
Nusa Zidaric
,
Mark D. Aagaard
,
Guang Gong
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic.
TrustED@CCS
(2013)
Mads Dam
,
Roberto Guanciale
,
Hamed Nemati
Machine code verification of a tiny ARM hypervisor.
TrustED@CCS
(2013)
Matthias Hiller
,
Michael Weiner
,
Leandro Rodrigues Lima
,
Maximilian Birkner
,
Georg Sigl
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes.
TrustED@CCS
(2013)
Dominik Merli
,
Rainer Plaga
Physical unclonable functions: devices for cryptostorage.
TrustED@CCS
(2013)
Nourhene Ellouze
,
Mohamed Allouche
,
Habib Ben Ahmed
,
Slim Rekhis
,
Noureddine Boudriga
Securing implantable cardiac medical devices: use of radio frequency energy harvesting.
TrustED@CCS
(2013)