2024
Mon CHÈRI ♡ Adapting Capability Hardware Enhanced RISC with Conditional Capabilities
M. Gülmez, H. Englund, J. T. Mühlberg, T. Nyman
Pre-print: https://arxiv.org/abs/2407.08663
@misc{Gulmez24a,
author = {Gülmez, Merve and Englund, Håkan and Mühlberg, Jan Tobias and Nyman, Thomas},
title = {Mon CHÉRI ♡ Adapting Capability Hardware Enhanced RISC with Conditional Capabilities},
year = {2024}, doi = {10.48550/ARXIV.2407.08663},
howpublished = {{\tt arXiv:2407.08663 [cs.CR]}},
url = {https://arxiv.org/abs/2407.08663},
}
2023
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust
M. Gülmez, T. Nyman, C. Baumann, J. T. Mühlberg
In Proceedings of IEEE Secure Development Conference 2023 (SecDev 2023)
DOI: https://doi.org/10.1109/SecDev56634.2023.00020
Pre-print: https://arxiv.org/abs/2306.08127
@inproceedings{Gulmez23d,
author = {Gülmez, Merve and Nyman, Thomas and Baumann, Christoph and
Mühlberg, Jan Tobias},
title = {Friend or Foe Inside? Exploring In-Process Isolation to
Maintain Memory Safety for Unsafe Rust},
booktitle = {2023 IEEE Secure Development Conference (SecDev)},
month = {oct}
year = {2023},
pages = {54-66},
url = {https://doi.ieeecomputersociety.org/10.1109/SecDev56634.2023.00020},
doi = {10.1109/SecDev56634.2023.00020},
location = {Atlanta, GA, USA},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
}
@misc{Gulmez23e,
author = {Gülmez, Merve and Nyman, Thomas and Baumann, Christoph and
Mühlberg, Jan Tobias},
title = {Friend or Foe Inside? Exploring In-Process Isolation to
Maintain Memory Safety for Unsafe Rust},
year = {2023}, doi = {10.48550/ARXIV.2306.08127},
howpublished = {{\tt arXiv:2306.08127 [cs.CR]}},
url = {https://arxiv.org/abs/2306.08127},
}
Exploring the Environmental Benefits of In-Process Isolation for Software Resilience
M. Gülmez, T. Nyman, C. Baumann, J. T. Mühlberg
In Proceedings of 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks – Supplemental Volume (DSN-S 2023).
DOI: http://doi.org/10.1109/DSN-S58398.2023.00056
Pre-print: https://arxiv.org/abs/2306.02131
@inproceedings{Gulmez23b,
author = {Gülmez, Merve and Nyman, Thomas and Baumann, Christoph and
Mühlberg, Jan Tobias},
title = {Exploring the Environmental Benefits of In-Process Isolation for
Software Resilience},
booktitle = {Proceedings of 53rd Annual IEEE/IFIP International Conference on
Dependable Systems and Networks - Supplemental Volume (DSN-S)},
series = {DSN '23},
month = {jun},
year = {2023},
pages = {203--205},
issn = {2833-292X/23},
url = {http://doi.org/10.1109/DSN-S58398.2023.00056},
doi = {10.1109/DSN-S58398.2023.00056},
location = {Porto, Portugal},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
@misc{Gulmez23c,
author = {Gülmez, Merve and Nyman, Thomas and Baumann, Christoph and
Mühlberg, Jan Tobias},
title = {Exploring the Environmental Benefits of In-Process Isolation for
Software Resilience},
year = {2023}, doi = {10.48550/ARXIV.2306.02131},
howpublished = {{\tt arXiv:2306.02131 [cs.CR]}},
url = {https://arxiv.org/abs/2306.02131},
}
Rewind & Discard: Improving Software Resilience Using Isolated Domains
M. Gülmez, T. Nyman, C. Baumann, J. T. Mühlberg
In Proceedings of 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2023).
DOI: http://doi.org/10.1109/DSN58367.2023.00046
@inproceedings{Gulmez23a,
author = {Gülmez, Merve and Nyman, Thomas and Baumann, Christoph and
Mühlberg, Jan Tobias},
title = {Rewind \& Discard: Improving Software Resilience Using Isolated Domains},
booktitle = {Proceedings of 53rd Annual IEEE/IFIP International Conference on
Dependable Systems and Networks},
series = {DSN '23},
month = {jun},
year = {2023},
pages = {402--416},
issn = {2158-3927},
url = {http://doi.org/10.1109/DSN58367.2023.00046},
doi = {10.1109/DSN58367.2023.00046},
location = {Porto, Portugal},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
2022
Hardware Platform Security for Mobile Devices
L. J. Gunn, N. Asokan, J-E. Ekberg, H. Liljestrand, V. Nayani, T. Nyman
In Foundations and Trends in Privacy and Security: Vol. 3: No. 3-4, pp 214-394, Jun. 2022.
DOI:http://dx.doi.org/10.1561/3300000024
Available: https://ssg.aalto.fi
@article{Gunn22,
author = {Lachlan J. Gunn and N. Asokan and Jan-Erik Ekberg and Hans Liljestrand and
Vijayanand Nayani and Thomas Nyman},
title = {Hardware Platform Security for Mobile Devices},
journal = {Foundations and Trends® in Privacy and Security},
year = {2022},
volume = {3},
number = {3-4},
pages = {214-394},
issn = {2474-1558},
doi = {10.1561/3300000024},
url = {http://dx.doi.org/10.1561/3300000024}
}
Unlimited Lives: Secure In-Process Rollback with Isolated Domains
M. Gülmez, T. Nyman, C. Baumann, J. T. Mühlberg
Pre-print: https://arxiv.org/abs/2205.03205
@misc{Gulmez22,
author = {Gülmez, Merve and Nyman, Thomas and Baumann, Christoph and
Mühlberg, Jan Tobias},
title = {Unlimited Lives: Secure In-Process Rollback with Isolated Domains},
year = {2022},
doi = {10.48550/ARXIV.2205.03205},
howpublished = {{\tt arXiv:2205.03205 [cs.CR]}},
url = {https://arxiv.org/abs/2205.03205},
}
2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches
L. Cheng, S. Ahmed, H. Liljestrand, T. Nyman, H. Cai, T. Jaeger, N. Asokan, D. Yao
In ACM Trans. Priv. Secur. 24, 4, Article 26 (November 2021).
DOI: https://doi.org/10.1145/3462699
@article{Cheng21,
author = {Cheng, Long and Ahmed, Salman and Liljestrand, Hans and
Nyman, Thomas and Cai, Haipeng and Jaeger, Trent and Asokan, N. and
Yao, Danfeng (Daphne)},
title = {Exploitation Techniques for Data-Oriented Attacks with Existing and
Potential Defense Approaches},
journal = {ACM Trans. Priv. Secur.},
volume = {24},
number = {4},
articleno = {26},
numpages = {36},
month = {sep},
year = {2021},
issue_date = {November 2021},
issn = {2471-2566},
doi = {10.1145/3462699},
url = {https://doi.org/10.1145/3462699},
publisher = {ACM},
address = {New York, NY, USA},
}
PacStack: an Authenticated Call Stack
H. Liljestrand, T. Nyman, L. J. Gunn, J-E. Ekberg, N. Asokan
In Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021).
Available: https://www.usenix.org
Technical report available at: https://arxiv.org/abs/1905.10242
@inproceedings{Liljestrand21,
author = {Hans Liljestrand and Thomas Nyman and Lachlan J. Gunn and
Jan-Erik Ekberg and N. Asokan},
title = {{PACStack}: an Authenticated Call Stack},
booktitle = {30th USENIX Security Symposium (USENIX Security 21)},
year = {2021},
isbn = {978-1-939133-24-3},
pages = {357--374},
url = {https://www.usenix.org/conference/usenixsecurity21/presentation/liljestrand},
publisher = {USENIX Association},
month = {aug}
}
@misc{Liljestrand19g,
author = {Liljestrand, Hans and Nyman,Thomas and Gunn, Lachlan J. and
Ekberg, Jan-Erik and Asokan, N. },
title={{PACStack}: an Authenticated Call Stack},
year = {2019},
howpublished = {{\tt arXiv:1905.10242 [cs.CR]}},
url = {https://arxiv.org/abs/1905.10242}
}
2020
Toward Hardware-assisted Run-Time Protection
T. Nyman
Aalto University publication series DOCTORAL DISSERTATIONS, 150/2020
URN: http://urn.fi/URN:ISBN:978-952-64-0065-5
@phdthesis{Nyman2020,
title={{Toward Hardware-assisted Run-time Protection}},
author={Nyman, Thomas},
year={2020},
language={English},
pages={130 + app. 101},
publisher={Aalto University},
school={School of Science},
type={Doctoral thesis},
isbn={978-952-64-0065-5 (electronic), 978-952-64-0064-8 (printed)},
series={Aalto University publication series DOCTORAL DISSERTATIONS; 150/2020},
issn={1799-4942 (electronic), 1799-4934 (printed), 1799-4934 (ISSN-L)},
url={http://urn.fi/URN:ISBN:978-952-64-0065-5}
}
2019
Protecting the stack with PACed canaries
H. Liljestrand, Z. Gauhar, T. Nyman, J-E. Ekberg, N. Asokan
In 4th Workshop on System Software for Trusted Execution (SysTEX 2019)
DOI: https://doi.org/10.1145/3342559.3365336
Technical report available at: https://arxiv.org/abs/1909.05747
@inproceedings{Liljestrand19e,
author = {Liljestrand, Hans and Gauhar, Zaheer and Nyman,Thomas and
Ekberg, Jan-Erik and Asokan, N. },
title = {Protecting the stack with {PACed} canaries},
booktitle = {Proceedings of the 4th Workshop on System Software for Trusted Execution},
series = {SysTEX '19},
year = {2019},
location = {Huntsville, Ontario, Canada},
numpages = {6},
url = {http://doi.acm.org/10.1145/2666141.2666146},
doi = {10.1145/2666141.2666146},
publisher = {ACM},
address = {New York, NY, USA},
}
@misc{Liljestrand19f,
author = {Liljestrand, Hans and Gautar, Zaheer and Nyman,Thomas and
Ekberg, Jan-Erik and Asokan, N. },
title={Protecting the stack with PACed canaries},
year = {2019},
howpublished = {{\tt arXiv:1909.05747 [cs.CR]}},
url = {https://arxiv.org/abs/1909.05747}
}
Late Breaking Results: Authenticated Call Stack
H. Liljestrand, T. Nyman, J-E. Ekberg. N. Asokan
In Proceedings of the 56th Annual Design Automation Conference (DAC 2019).
DOI: https://doi.org/10.1145/3316781.3322469
@inproceedings{Liljestrand19c,
author = {Liljestrand, Hans and Nyman, Thomas and Ekberg, Jan-Erik and Asokan, N.},
title = {Late Breaking Results: Authenticated Call Stack},
booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019},
series = {DAC '19},
year = {2019},
isbn = {978-1-4503-6725-7},
location = {Las Vegas, NV, USA},
pages = {223:1--223:2},
articleno = {223},
numpages = {2},
url = {http://doi.acm.org/10.1145/3316781.3322469},
doi = {10.1145/3316781.3322469},
acmid = {3322469},
publisher = {ACM},
address = {New York, NY, USA},
}
Exploitation Techniques and Defenses for Data-Oriented Attacks.
L. Cheng, H. Liljestrand, T. Nyman, Y. Tsung Lee., D. Yao., T. Jaeger, N. Asokan.
In Proceedings of IEEE Secure Development Conference 2019 (SecDev 2019)
DOI: https://doi.org/10.1109/SecDev.2019.00022
Available: https://conferences.computer.org/
Technical report available at: https://arxiv.org/abs/1902.08359
@inproceedings{Cheng19a,
author = {Cheng,Long and Liljestrand, Hans and Md Salman Ahmed and Nyman,Thomas and
Yao,Danfeng and Yaeger, Trent and Asokan, N. },
title={Exploitation Techniques and Defenses for Data-Oriented Attacks},
booktitle = {Proceedings of IEEE Secure Development Conference 2019},
series = {SecDev '19},
month = {sep},
year= {2019},
pages = {114--128},
isbn = {978-1-5386-7289-1},
url = {https://doi.org/10.1109/SecDev.2019.00022}
doi = {10.1109/SecDev.2019.00022}
location = {McClean, Virginia},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
@misc{Cheng19b,
author = {Cheng, Long and Liljestrand, Hans and Nyman,Thomas and Tsung Lee, Yu and
Yao,Danfeng and Yaeger, Trent and Asokan, N. },
title={Exploitation Techniques and Defenses for Data-Oriented Attacks},
year = {2019},
howpublished = {{\tt arXiv:1902.08359 [cs.CR]}},
url = {https://arxiv.org/abs/1902.08359}
}
HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
T. Nyman, G. Dessouky, S. Zeitouni. A. Lehikoinen, A. Paverd, N. Asokan and A-R. Sadeghi.
In Proceedings of the 56th Annual Design Automation Conference (DAC 2019).
DOI: https://doi.org/10.1145/3316781.3317836
Technical report available at: https://arxiv.org/abs/1705.10295
@inproceedings{Nyman19,
author = {Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza},
title = {HardScope: Hardening Embedded Systems Against Data-Oriented Attacks},
booktitle = {Proceedings of the 56th Annual Design Automation Conference 2019},
series = {DAC '19},
year = {2019},
isbn = {978-1-4503-6725-7},
location = {Las Vegas, NV, USA},
pages = {63:1--63:6},
articleno = {63},
numpages = {6},
url = {http://doi.acm.org/10.1145/3316781.3317836},
doi = {10.1145/3316781.3317836},
acmid = {3317836},
publisher = {ACM},
address = {New York, NY, USA},
}
@misc{Nyman17c,
author = {Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Paverd, Andrew and
Lehikoinen, Aaro and Asokan, N. and Sadeghi, Ahmad-Reza},
title={{HardScope}: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement},
year = {2017},
howpublished = {{\tt arXiv:1705.10295 [cs.CR]}},
url = {https://arxiv.org/abs/1705.10295}
}
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication.
H. Liljestrand, T. Nyman, K. Wang, C. Chinea Perez, J-E Ekberg, N. Asokan
In Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019).
Available: https://www.usenix.org/
Technical report available at: https://arxiv.org/abs/1811.09189
@inproceedings {Liljestrand19a,
author = {Hans Liljestrand and Thomas Nyman and Kui Wang and Carlos Chinea Perez and Jan-Erik Ekberg and N. Asokan},
title = {{PAC} it up: Towards Pointer Integrity using {ARM} Pointer Authentication},
booktitle = {28th {USENIX} Security Symposium ({USENIX} Security 19)},
year = {2019},
isbn = {978-1-939133-06-9},
address = {Santa Clara, CA},
pages = {177--194},
url = {https://www.usenix.org/conference/usenixsecurity19/presentation/liljestrand},
publisher = {{USENIX} Association},
month = aug,
}
@misc{Liljestrand19b,
author = {Liljestrand, Hans. and Nyman, Thomas and Wang, Kui and Chinea Perez, Carlos and
Ekberg, Jan-Erik and Asokan, N.},
title={PAC it up: Towards Pointer Integrity using ARM Pointer Authentication},
year = {2019},
howpublished = {{\tt arXiv:1811.09189[cs.CR]}},
url = {https://arxiv.org/abs/1811.09189}
}
2018
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
N. Asokan, T. Nyman, N. Rattanavipanon, A-R. Sadeghi and G. Tsudik.
In IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 37, no. 11,. IEEE, 2290-2300, Nov. 2018. (Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018).
DOI: https://doi.org/10.1109/TCAD.2018.2858422
Technical report available at: https://arxiv.org/abs/1807.05002
@article{Asokan18a,
author = {N. Asokan and T. Nyman and N. Rattanavipanon and A. Sadeghi and G. Tsudik},
title = {{ASSURED}: Architecture for Secure Software Update of Realistic Embedded Devices},
journal = {IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems},
month = {Nov},
year = {2018},
volume = {37},
number = {11},
pages = {2290-2300},
url = {https://doi.org/10.1109/TCAD.2018.2858422},
doi = {10.1109/TCAD.2018.2858422},
issn = {0278-0070},
note = {Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018}
}
@misc{Asokan18b,
author = {Asokan, N. and Nyman, Thomas and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and
Tsudik, Gene },
title={{ASSURED}: Architecture for Secure Software Update of Realistic Embedded Devices},
year = {2019},
howpublished = {{\tt arXiv:1807.05002[cs.CR]}},
url = {https://arxiv.org/abs/1807.05002}
}
2017
CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers.
T. Nyman, J-E. Ekberg, L. Davi and N. Asokan.
In Dacier M., Bailey M., Polychronakis M., Antonakakis M. (eds) Research in Attacks, Intrusions, and Defenses (RAID 2017). Lecture Notes in Computer Science, vol 10453. Springer, Cham, 259-284.
DOI: https://doi.org/10.1007/978-3-319-66332-6_12
Technical report available at: https://arxiv.org/abs/1706.05715
@inproceedings{Nyman17a,
author={Nyman, Thomas and Ekberg, Jan-Erik and Davi, Lucas and Asokan, N.},
title={{CFI CaRE}: Hardware-Supported Call and Return Enforcement for
Commercial Microcontrollers},
editor={Dacier, Marc and Bailey, Michael and Polychronakis, Michalis and Antonakakis, Manos},
booktitle={Research in Attacks, Intrusions, and Defenses},
year={2017},
pages={259--284},
publisher={Springer International Publishing},
address={Cham},
isbn={978-3-319-66332-6}
}
@misc{Nyman17b,
author={Nyman, Thomas and Ekberg, Jan-Erik and Davi, Lucas and Asokan, N.},
title={{CFI CaRE}: Hardware-Supported Call and Return Enforcement for
Commercial Microcontrollers},
year = {2017},
howpublished = {{\tt arXiv:1706.05715 [cs.CR]}},
url = {https://arxiv.org/abs/1706.05715}
}
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
G. Dessouky, S. Zeitouni, T. Nyman, A. Paverd, L. Davi, P. Koeberl, N. Asokan and A-R. Sadeghi.
In Proceedings of the 54th Annual Design Automation Conference 2017 (DAC ’17). ACM, New York, NY, USA, Article 24, 6 pages.
DOI: https://doi.org/10.1145/3061639.3062276
Technical report available at: https://arxiv.org/abs/1706.03754
@inproceedings{Dessouky17a,
author = {Dessouky, Ghada and Zeitouni, Shaza and Nyman, Thomas and Paverd, Andrew and
Davi, Lucas and Koeberl, Patrick and Asokan, N. and Sadeghi, Ahmad-Reza},
title = {{LO-FAT}: Low-Overhead Control Flow ATtestation in Hardware},
booktitle = {Proceedings of the 54th Annual Design Automation Conference 2017},
series = {DAC '17},
year = {2017},
isbn = {978-1-4503-4927-7},
location = {Austin, TX, USA},
pages = {24:1--24:6},
articleno = {24},
numpages = {6},
url = {http://doi.acm.org/10.1145/3061639.3062276},
doi = {10.1145/3061639.3062276},
acmid = {3062276},
publisher = {ACM},
address = {New York, NY, USA},
}
@misc{Dessouky17b,
author = {Dessouky, Ghada and Zeitouni, Shaza and Nyman, Thomas and Paverd, Andrew and
Davi, Lucas and Koeberl, Patrick and Asokan, N. and Sadeghi, Ahmad-Reza},
title = {{LO-FAT}: Low-Overhead Control Flow ATtestation in Hardware},
year = {2017},
howpublished = {{\tt arXiv:1706.03754 [cs.CR]}},
url = {https://arxiv.org/abs/1706.03754}
}
2016
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
T. Abera, N. Asokan , L. Davi , J-E. Ekberg, T. Nyman , A. Paverd , A-R. Sadeghi and G. Tsudik.
In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16). ACM, New York, NY, USA, 743-754.
DOI: https://doi.org/10.1145/2976749.2978358
Technical report available at: https://arxiv.org/abs/1605.07763
@inproceedings{Abera16a,
author = {Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and
Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene},
title = {{C-FLAT}: Control-Flow Attestation for Embedded Systems Software},
booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on
Computer and Communications Security},
series = {CCS '16},
year = {2016},
isbn = {978-1-4503-4139-4},
location = {Vienna, Austria},
pages = {743--754},
numpages = {12},
url = {http://doi.acm.org/10.1145/2976749.2978358},
doi = {10.1145/2976749.2978358},
acmid = {2978358},
publisher = {ACM},
address = {New York, NY, USA},
}
@misc{Abera16b,
author = {Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and
Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene},
title = {{C-FLAT}: Control-Flow Attestation for Embedded Systems Software},
year = {2016},
howpublished = {{\tt arXiv:1605.07763 [cs.CR]}},
url = {https://arxiv.org/abs/1605.07763}
}
Characterizing SEAndroid Policies in the Wild.
E. Reshetova, F. Bonazzi, T. Nyman, R. Borgaonkar, N. Asokan.
In Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP ’16) – Volume 1. SciTePress, 482-489.
DOI: https://www.doi.org/10.5220/0005759204820489
Technical report available at: https://arxiv.org/abs/1510.05497
@inproceedings{Reshetova16,
author={Elena Reshetova and Filippo Bonazzi and Thomas Nyman and
Ravishankar Borgaonkar and N. Asokan},
title={Characterizing {SEAndroid} Policies in the Wild},
booktitle={Proceedings of the 2nd International Conference on
Information Systems Security and Privacy - Volume 1: ICISSP},
year={2016},
pages={482-489},
publisher={SciTePress},
organization={INSTICC},
isbn={978-989-758-167-0},
url={https://www.doi.org/10.5220/0005759204820489},
doi={10.5220/0005759204820489}
}
@misc{Reshetova15,
author = {Reshetova, Elena and Bonazzi, Filippo and Nyman, Thomas and
Borgaonkar, Ravishankar and Asokan, N.},
title = {Characterizing {SEAndroid} Policies in the Wild},
year = {2015},
howpublished = {{\tt arXiv:1510.05497 [cs.CR]}},
url = {https://arxiv.org/abs/1510.05497}
}
2015
On Making Emerging Trusted Execution Environments Accessible to Developers.
T. Nyman, B. McGillion and N. Asokan.
In Conti M., Schunter M., Askoxylakis I. (eds) Trust and Trustworthy Computing (Trust 2015). Lecture Notes in Computer Science, vol 9229. Springer, Cham, 58-67.
DOI: https://doi.org/10.1007/978-3-319-22846-4_4
Technical report available at: http://arxiv.org/abs/1506.07739
@inproceedings{Nyman15a,
author={Nyman, Thomas and McGillion, Brian and Asokan, N.},
editor={Conti, Mauro and Schunter, Matthias and Askoxylakis, Ioannis},
title={On Making Emerging Trusted Execution Environments Accessible to Developers},
booktitle={Trust and Trustworthy Computing},
year={2015},
pages={58--67},
publisher={Springer International Publishing},
address={Cham},
isbn={978-3-319-22846-4},
url = {http://doi.org/10.1007/978-3-319-22846-4_4},
doi = {10.1007/978-3-319-22846-4_4}
}
@misc{Nyman15b,
author = {Nyman, Thomas and McGillion, Brian and N. Asokan},
title = {On Making Emerging Trusted Execution Environments Accessible to Developers},
year = {2015},
howpublished = {{\tt arXiv:1506.07739 [cs.CR]}},
url = {http://arxiv.org/abs/1506.07739}
}
Open-TEE – An Open Virtual Trusted Execution Environment.
B. McGillion, T. Dettenborn, T. Nyman and N. Asokan.
In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA (TRUSTCOM ’15) – Volume 01. IEEE Computer Society, Washington, DC, USA, 400-407.
DOI: http://dx.doi.org/10.1109/Trustcom.2015.400
Technical report available at: http://arxiv.org/abs/1506.07367
@inproceedings{McGillion15a,
author = {McGillion, Brian and Dettenborn, Tanel and Nyman, Thomas and Asokan, N.},
title = {{Open-TEE} -- An Open Virtual Trusted Execution Environment},
booktitle = {Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 01},
series = {TRUSTCOM '15},
year = {2015},
isbn = {978-1-4673-7952-6},
pages = {400--407},
numpages = {8},
url = {http://dx.doi.org/10.1109/Trustcom.2015.400},
doi = {10.1109/Trustcom.2015.400},
acmid = {2848580},
publisher = {IEEE Computer Society},
address = {Washington, DC, USA},
}
@misc{McGillion15b,
author = {McGillion, Brian and Dettenborn, Tanel and Nyman, Thomas and N. Asokan},
title = {{Open-TEE} -- An Open Virtual Trusted Execution Environment},
year = {2015},
howpublished = {{\tt arXiv:1506.07367 [cs.CR]}},
url = {http://arxiv.org/abs/1506.07367}
}
2014
Security of OS-Level Virtualization Technologies.
E. Reshetova, J. Karhunen, T. Nyman and N. Asokan.
In Bernsmed K., Fischer-Hübner S. (eds) Secure IT Systems (NordSec 2014). Lecture Notes in Computer Science, vol 8788. Springer, Cham, 77–93.
DOI: https://doi.org/10.1007/978-3-319-11599-3_5
Technical report available at: https://arxiv.org/abs/1407.4245
@inproceedings{Reshetova14a,
author={Reshetova, Elena and Karhunen, Janne and Nyman, Thomas and Asokan, N.},
title={Security of {OS}-Level Virtualization Technologies},
booktitle={Secure IT Systems},
editor={Bernsmed, Karin and Fischer-H{\"u}bner, Simone},
year={2014},
pages={77--93},
publisher={Springer International Publishing},
address={Cham},
isbn={978-3-319-11599-3},
url = {https://doi.org/10.1007/978-3-319-11599-3_5},
doi = {10.1007/978-3-319-11599-3_5}
}
@misc{Reshetova14b,
author = {Reshetova, Elena and Karhunen, Janne and Nyman, Thomas and Asokan, N.},
title = {Security of {OS}-Level Virtualization Technologies},
year = {2014},
howpublished = {{\tt arXiv:1047.4245 [cs.CR]}},
url = {https://arxiv.org/abs/1407.4245}
}
Citizen Electronic Identities Using TPM 2.0.
T. Nyman, J-E. Ekberg, N. Asokan.
In Proceedings of the 4th International Workshop on Trustworthy Embedded Devices (TrustEd ’14). ACM, New York, NY, USA, 37-48.
DOI: http://doi.acm.org/10.1145/2666141.2666146
Technical report available at: https://arxiv.org/abs/1409.1023
@inproceedings{Nyman14a,
author = {Nyman, Thomas and Ekberg, Jan-Erik and Asokan, N.},
title = {Citizen Electronic Identities Using {TPM 2.0}},
booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices},
series = {TrustED '14},
year = {2014},
isbn = {978-1-4503-3149-4},
location = {Scottsdale, Arizona, USA},
pages = {37--48},
numpages = {12},
url = {http://doi.acm.org/10.1145/2666141.2666146},
doi = {10.1145/2666141.2666146},
acmid = {2666146},
publisher = {ACM},
address = {New York, NY, USA},
}
@misc{Nyman14b,
author = {Nyman, Thomas and Ekberg, Jan-Erik and Asokan, N.},
title = {Citizen Electronic Identities Using {TPM 2.0}},
year = {2014},
howpublished = {{\tt arXiv:1409.1023 [cs.CR]}},
url = {https://arxiv.org/abs/1409.1023}
}