default search action
4th TrustED@CCS 2014: Scottsdale, Arizona, USA
- Gail-Joon Ahn, Frederik Armknecht, Jorge Guajardo:
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014. ACM 2014, ISBN 978-1-4503-3149-4
Embedded Security Attacks and Countermeasures
- Gene Tsudik:
Challenges in Remote Attestation of Low-End Embedded Devices. 1 - Chongxi Bao, Ankur Srivastava:
A Secure Algorithm for Task Scheduling against Side-channel Attacks. 3-12 - Konrad-Felix Krentz, Gerhard Wunder:
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity. 13-22
System Security
- Ahmad-Reza Sadeghi, Lucas Davi:
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks. 23 - Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng:
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. 25-36
TPMs and Identity Management
- Thomas Nyman, Jan-Erik Ekberg, N. Asokan:
Citizen Electronic Identities using TPM 2.0. 37-48 - Tiffany Hyun-Jin Kim:
Challenges of Establishing Trust in Online Entities and Beyond. 49
Efficient Implementations
- Markku-Juhani Olavi Saarinen:
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor. 51-56
Hardware and System Attacks
- Christof Paar:
How to Build Hardware Trojans. 57 - Yier Jin:
Embedded System Security in Smart Consumer Electronics. 59
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.