C-FLAT: control-flow attestation for embedded systems software T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 277 | 2016 |
LO-FAT: Low-overhead control flow attestation in hardware G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ... Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017 | 111 | 2017 |
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication H Liljestrand, T Nyman, K Wang, CC Perez, JE Ekberg, N Asokan 28th USENIX Security Symposium (USENIX Security 2019), 177-194, 2019 | 109 | 2019 |
Open-TEE - An Open Virtual Trusted Execution Environment B McGillion, T Dettenborn, T Nyman, N Asokan 2015 IEEE Trustcom/BigDataSE/ISPA 1, 400-407, 2015 | 97 | 2015 |
Security of OS-level virtualization technologies E Reshetova, J Karhunen, T Nyman, N Asokan Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014 | 85 | 2014 |
ASSURED: Architecture for secure software update of realistic embedded devices N Asokan, T Nyman, N Rattanavipanon, AR Sadeghi, G Tsudik IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018 | 80 | 2018 |
CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers T Nyman, JE Ekberg, L Davi, N Asokan Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017 | 55 | 2017 |
PACStack: an Authenticated Call Stack. H Liljestrand, T Nyman, LJ Gunn, JE Ekberg, N Asokan USENIX Security Symposium, 357-374, 2021 | 40 | 2021 |
Characterizing SEAndroid policies in the wild E Reshetova, F Bonazzi, T Nyman, R Borgaonkar, N Asokan arXiv preprint arXiv:1510.05497, 2015 | 23 | 2015 |
Citizen electronic identities using TPM 2.0 T Nyman, JE Ekberg, N Asokan Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014 | 23 | 2014 |
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ... arXiv preprint arXiv:1705.10295, 2017 | 21 | 2017 |
Exploitation techniques and defenses for data-oriented attacks L Cheng, H Liljestrand, MS Ahmed, T Nyman, T Jaeger, N Asokan, D Yao 2019 IEEE Cybersecurity Development (SecDev), 114-128, 2019 | 19 | 2019 |
Protecting the stack with PACed canaries H Liljestrand, Z Gauhar, T Nyman, JE Ekberg, N Asokan Proceedings of the 4th Workshop on System Software for Trusted Execution, 1-6, 2019 | 18 | 2019 |
Security of OS-level virtualization technologies: Technical report E Reshetova, J Karhunen, T Nyman, N Asokan arXiv preprint arXiv:1407.4245, 2014 | 15 | 2014 |
HardScope: Hardening embedded systems against data-oriented attacks T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ... Proceedings of the 56th Annual Design Automation Conference 2019, 1-6, 2019 | 13 | 2019 |
Authenticated call stack H Liljestrand, T Nyman, JE Ekberg, N Asokan Proceedings of the 56th Annual Design Automation Conference 2019, 1-2, 2019 | 10 | 2019 |
On making emerging trusted execution environments accessible to developers T Nyman, B McGillion, N Asokan Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015 | 8 | 2015 |
Exploitation techniques for data-oriented attacks with existing and potential defense approaches L Cheng, S Ahmed, H Liljestrand, T Nyman, H Cai, T Jaeger, N Asokan, ... ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-36, 2021 | 4 | 2021 |
Hardware Platform Security for Mobile Devices LJ Gunn, N Asokan, JE Ekberg, H Liljestrand, V Nayani, T Nyman Foundations and Trends® in Privacy and Security 3 (3-4), 214-394, 2022 | 2 | 2022 |
Unlimited Lives: Secure In-Process Rollback with Isolated Domains M Turhan, T Nyman, C Bauman, JT Mühlberg arXiv preprint arXiv:2205.03205, 2022 | 1 | 2022 |