Author of the publication

Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?

, , , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 159-178. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The sybil attack in sensor networks: analysis & defenses., , , and . IPSN, page 259-268. ACM, (2004)OASIS: on achieving a sanctuary for integrity and secrecy on untrusted platforms., , , , , and . ACM Conference on Computer and Communications Security, page 13-24. ACM, (2013)Replayer: automatic protocol replay by binary analysis., , , and . CCS, page 311-321. ACM, (2006)Towards Practical Automatic Generation of Multipath Vulnerability Signatures, , , and . CMU-CS-07-150. School of Computer Science, Carnegie Mellon University, (2007)Sting: An End-to-End Self-Healing System for Defending against Internet Worms., , and . Malware Detection, volume 27 of Advances in Information Security, Springer, (2007)Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?, , , , and . TRUST, volume 7344 of Lecture Notes in Computer Science, page 159-178. Springer, (2012)ReDABLS: Revisiting Device Attestation with Bounded Leakage of Secrets., , , and . Security Protocols Workshop, volume 8263 of Lecture Notes in Computer Science, page 94-114. Springer, (2013)Towards Automatic Discovery of Deviations in Binary Implementations with Applications to Error Detection and Fingerprint Generation., , , and . USENIX Security Symposium, USENIX Association, (2007)MiniBox: A Two-Way Sandbox for x86 Native Code., , , , , and . USENIX Annual Technical Conference, page 409-420. USENIX Association, (2014)Trustworthy Execution on Mobile Devices., , and . Springer Briefs in Computer Science Springer, (2014)