|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 42 publication records. Showing 42 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | David F. Oswald |
Wireless Attacks on Automotive Remote Keyless Entry Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 43-44, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Marcel Medwed |
IoT Security Challenges and Ways Forward. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 55, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Naoya Torii, Dai Yamamoto, Tsutomu Matsumoto |
Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 23-30, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Ethan Gaebel, Ning Zhang 0017, Wenjing Lou, Y. Thomas Hou 0001 |
Looks Good To Me: Authentication for Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 57-67, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Andrei Costin |
Security of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 45-54, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Aurélien Francillon |
Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next? ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 1, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Edgar R. Weippl, Stefan Katzenbeisser 0001, Mathias Payer, Stefan Mangard, Xinxin Fan, Tim Güneysu (eds.) |
Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016 ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![ACM, 978-1-4503-4567-5 The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Huth, René Guillaume, Paul Duplys, Kumaragurubaran Velmurugan, Tim Güneysu |
On the Energy Cost of Channel Based Key Agreement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 31-41, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Hiller, Aysun Gurur Önalan, Georg Sigl, Martin Bossert |
Online Reliability Testing for PUF Key Derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 15-22, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Markus Dürmuth, David F. Oswald, Niklas Pastewka |
Side-Channel Attacks on Fingerprint Matching Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016, pp. 3-13, 2016, ACM, 978-1-4503-4567-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Jan Nordholz, Julian Vetter, Michael Peter, Matthias Junker-Petschick, Janis Danisevskis |
XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 55-64, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Alexandra Mikityuk, Stefan Pham, Stefan Kaiser, Oliver Friedrich, Stefan Arbanowski |
Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 43-52, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Xiaofeng Wang, Kui Ren 0001 (eds.) |
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015 ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![ACM, 978-1-4503-3828-8 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | André Schaller, Boris Skoric, Stefan Katzenbeisser 0001 |
On the Systematic Drift of Physically Unclonable Functions Due to Aging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 15-20, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yang Xie, Chongxi Bao, Ankur Srivastava 0001 |
Security-Aware Design Flow for 2.5D IC Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 31-38, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jakub Szefer |
Leveraging Processor Performance Counters for Security and Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 41, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marten van Dijk |
Hardware Security and its Adversaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 1-2, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | André Weimerskirch |
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 53, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryan A. Scheel, Akhilesh Tyagi |
Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 3-13, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Xin Ye 0002, Mostafa Taha, Cong Chen, Thomas Eisenbarth 0001 |
Faster Leakage Detection and Exploitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 21-29, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Geremy Condra |
A Plea for Incremental Work in IoT Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015, pp. 39, 2015, ACM, 978-1-4503-3828-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Lucas Davi |
Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 23, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Nyman, Jan-Erik Ekberg, N. Asokan |
Citizen Electronic Identities using TPM 2.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 37-48, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shijun Zhao, Qianying Zhang, Guangyao Hu, Yu Qin, Dengguo Feng |
Providing Root of Trust for ARM TrustZone using On-Chip SRAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 25-36, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Konrad-Felix Krentz, Gerhard Wunder |
6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 13-22, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chongxi Bao, Ankur Srivastava 0001 |
A Secure Algorithm for Task Scheduling against Side-channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 3-12, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Markku-Juhani Olavi Saarinen |
Simple AEAD Hardware Interface (SÆHI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 51-56, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yier Jin |
Embedded System Security in Smart Consumer Electronics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 59, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gene Tsudik |
Challenges in Remote Attestation of Low-End Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 1, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christof Paar |
How to Build Hardware Trojans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 57, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tiffany Hyun-Jin Kim |
Challenges of Establishing Trust in Online Entities and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014, pp. 49, 2014, ACM, 978-1-4503-3149-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gail-Joon Ahn, Frederik Armknecht, Jorge Guajardo (eds.) |
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014 ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![ACM, 978-1-4503-3149-4 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Sanjay K. Jha |
Securing data provenance in body area networks using lightweight wireless link fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 65-72, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahmad-Reza Sadeghi, Frederik Armknecht, Jean-Pierre Seifert (eds.) |
TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![ACM, 978-1-4503-2486-1 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
1 | Robbert van den Berg, Boris Skoric, Vincent van der Leest |
Bias-based modeling and entropy analysis of PUFs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 13-20, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Anthony Van Herrewege, Vincent van der Leest, André Schaller, Stefan Katzenbeisser 0001, Ingrid Verbauwhede |
Secure PRNG seeding on commercial off-the-shelf microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 55-64, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Christian Boit, Clemens Helfmeier, Dmitry Nedospasov |
Feasibly clonable functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 73-74, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Nusa Zidaric, Mark D. Aagaard, Guang Gong |
Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 21-34, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mads Dam, Roberto Guanciale, Hamed Nemati |
Machine code verification of a tiny ARM hypervisor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 3-12, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Matthias Hiller, Michael Weiner, Leandro Rodrigues Lima, Maximilian Birkner, Georg Sigl |
Breaking through fixed PUF block limitations with differential sequence coding and convolutional codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 43-54, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Merli, Rainer Plaga |
Physical unclonable functions: devices for cryptostorage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 1-2, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Nourhene Ellouze, Mohamed Allouche, Habib Ben Ahmed, Slim Rekhis, Noureddine Boudriga |
Securing implantable cardiac medical devices: use of radio frequency energy harvesting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustED@CCS ![In: TrustED'13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, November 4, 2013, Berlin, Germany, pp. 35-42, 2013, ACM, 978-1-4503-2486-1. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #42 of 42 (100 per page; Change: )
|
|