Thomas Nyman
Thomas Nyman
Doctoral Candidate
Verified email at aalto.fi - Homepage
TitleCited byYear
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
982016
Open-TEE--An Open Virtual Trusted Execution Environment
B McGillion, T Dettenborn, T Nyman, N Asokan
2015 IEEE Trustcom/BigDataSE/ISPA 1, 400-407, 2015
462015
Security of OS-level virtualization technologies
E Reshetova, J Karhunen, T Nyman, N Asokan
Nordic Conference on Secure IT Systems, 77-93, 2014
462014
Lo-fat: Low-overhead control flow attestation in hardware
G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 24, 2017
312017
Citizen electronic identities using TPM 2.0
T Nyman, JE Ekberg, N Asokan
Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014
152014
CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers
T Nyman, JE Ekberg, L Davi, N Asokan
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2017
142017
Characterizing SEAndroid policies in the wild
E Reshetova, F Bonazzi, T Nyman, R Borgaonkar, N Asokan
arXiv preprint arXiv:1510.05497, 2015
132015
Security of OS-level virtualization technologies: Technical report
E Reshetova, J Karhunen, T Nyman, N Asokan
arXiv preprint arXiv:1407.4245, 2014
132014
{PAC} it up: Towards Pointer Integrity using {ARM} Pointer Authentication
H Liljestrand, T Nyman, K Wang, CC Perez, JE Ekberg, N Asokan
28th {USENIX} Security Symposium ({USENIX} Security 19), 177-194, 2019
122019
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
arXiv preprint arXiv:1705.10295, 2017
122017
ASSURED: Architecture for secure software update of realistic embedded devices
N Asokan, T Nyman, N Rattanavipanon, AR Sadeghi, G Tsudik
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
112018
On making emerging trusted execution environments accessible to developers
T Nyman, B McGillion, N Asokan
International Conference on Trust and Trustworthy Computing, 58-67, 2015
62015
Hardscope: Hardening embedded systems against data-oriented attacks
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-6, 2019
12019
Authenticated Call Stack
H Liljestrand, T Nyman, JE Ekberg, N Asokan
Proceedings of the 56th Annual Design Automation Conference 2019, 223, 2019
12019
Exploitation Techniques and Defenses for Data-Oriented Attacks
L Cheng, H Liljestrand, T Nyman, YT Lee, D Yao, T Jaeger, N Asokan
arXiv preprint arXiv:1902.08359, 2019
12019
Protecting the stack with PACed canaries
H Liljestrand, Z Gauhar, T Nyman, JE Ekberg, N Asokan
arXiv preprint arXiv:1909.05747, 2019
2019
Late Breaking Results: Authenticated Call Stack
H Liljestrand, T Nyman, JE Ekberg, N Asokan
2019 56th ACM/IEEE Design Automation Conference (DAC), 1-2, 2019
2019
PACStack: an Authenticated Call Stack
H Liljestrand, T Nyman, LJ Gunn, JE Ekberg, N Asokan
arXiv preprint arXiv:1905.10242, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–18