
Search dblp for Publications
export results for "stream:streams/conf/trusted-ws:"
@inproceedings{DBLP:conf/ccs/Costin16, author = {Andrei Costin}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Security of {CCTV} and Video Surveillance Systems: Threats, Vulnerabilities, Attacks, and Mitigations}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {45--54}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995290}, doi = {10.1145/2995289.2995290}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Costin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DurmuthOP16, author = {Markus D{\"{u}}rmuth and David F. Oswald and Niklas Pastewka}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Side-Channel Attacks on Fingerprint Matching Algorithms}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {3--13}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995294}, doi = {10.1145/2995289.2995294}, timestamp = {Thu, 07 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DurmuthOP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Francillon16, author = {Aur{\'{e}}lien Francillon}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Analyzing Thousands of Firmware Images and a Few Physical Devices: What's Next?}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {1}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995296}, doi = {10.1145/2995289.2995296}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Francillon16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GaebelZLH16, author = {Ethan Gaebel and Ning Zhang and Wenjing Lou and Y. Thomas Hou}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Looks Good To Me: Authentication for Augmented Reality}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {57--67}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995295}, doi = {10.1145/2995289.2995295}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaebelZLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HillerOSB16, author = {Matthias Hiller and Aysun Gurur {\"{O}}nalan and Georg Sigl and Martin Bossert}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Online Reliability Testing for {PUF} Key Derivation}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {15--22}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995293}, doi = {10.1145/2995289.2995293}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HillerOSB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuthGDVG16, author = {Christopher Huth and Ren{\'{e}} Guillaume and Paul Duplys and Kumaragurubaran Velmurugan and Tim G{\"{u}}neysu}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {On the Energy Cost of Channel Based Key Agreement}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {31--41}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995291}, doi = {10.1145/2995289.2995291}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuthGDVG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Medwed16, author = {Marcel Medwed}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {IoT Security Challenges and Ways Forward}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {55}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995298}, doi = {10.1145/2995289.2995298}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Medwed16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Oswald16, author = {David F. Oswald}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Wireless Attacks on Automotive Remote Keyless Entry Systems}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {43--44}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995297}, doi = {10.1145/2995289.2995297}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Oswald16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ToriiYM16, author = {Naoya Torii and Dai Yamamoto and Tsutomu Matsumoto}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Evaluation of Latch-based Physical Random Number Generator Implementation on 40 nm ASICs}, booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, pages = {23--30}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289.2995292}, doi = {10.1145/2995289.2995292}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ToriiYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016trusted, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Mathias Payer and Stefan Mangard and Xinxin Fan and Tim G{\"{u}}neysu}, title = {Proceedings of the 6th International Workshop on Trustworthy Embedded Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995289}, doi = {10.1145/2995289}, isbn = {978-1-4503-4567-5}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Condra15, author = {Geremy Condra}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {A Plea for Incremental Work in IoT Security}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {39}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808424}, doi = {10.1145/2808414.2808424}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Condra15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Dijk15, author = {Marten van Dijk}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Hardware Security and its Adversaries}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {1--2}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808422}, doi = {10.1145/2808414.2808422}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Dijk15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MikityukPKFA15, author = {Alexandra Mikityuk and Stefan Pham and Stefan Kaiser and Oliver Friedrich and Stefan Arbanowski}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Content Protection in {HTML5} {TV} Platforms: Towards Browser-agnostic {DRM} and Cloud {UI} Environments}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {43--52}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808416}, doi = {10.1145/2808414.2808416}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MikityukPKFA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NordholzVPJD15, author = {Jan Nordholz and Julian Vetter and Michael Peter and Matthias Junker{-}Petschick and Janis Danisevskis}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {XNPro: Low-Impact Hypervisor-Based Execution Prevention on {ARM}}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {55--64}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808415}, doi = {10.1145/2808414.2808415}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NordholzVPJD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchallerS015, author = {Andr{\'{e}} Schaller and Boris Skoric and Stefan Katzenbeisser}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {On the Systematic Drift of Physically Unclonable Functions Due to Aging}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {15--20}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808417}, doi = {10.1145/2808414.2808417}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchallerS015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ScheelT15, author = {Ryan A. Scheel and Akhilesh Tyagi}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {3--13}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808418}, doi = {10.1145/2808414.2808418}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ScheelT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Szefer15, author = {Jakub Szefer}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Leveraging Processor Performance Counters for Security and Performance}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {41}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808421}, doi = {10.1145/2808414.2808421}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Szefer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Weimerskirch15, author = {Andr{\'{e}} Weimerskirch}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {An Overview of Automotive Cybersecurity: Challenges and Solution Approaches}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {53}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808423}, doi = {10.1145/2808414.2808423}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Weimerskirch15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XieBS15, author = {Yang Xie and Chongxi Bao and Ankur Srivastava}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Security-Aware Design Flow for 2.5D {IC} Technology}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {31--38}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808420}, doi = {10.1145/2808414.2808420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XieBS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YeTCE15, author = {Xin Ye and Mostafa Taha and Cong Chen and Thomas Eisenbarth}, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Faster Leakage Detection and Exploitation}, booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, pages = {21--29}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414.2808419}, doi = {10.1145/2808414.2808419}, timestamp = {Fri, 08 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YeTCE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2015trusted, editor = {Indrajit Ray and Xiaofeng Wang and Kui Ren}, title = {Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808414}, doi = {10.1145/2808414}, isbn = {978-1-4503-3828-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2015trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaoS14, author = {Chongxi Bao and Ankur Srivastava}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {A Secure Algorithm for Task Scheduling against Side-channel Attacks}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {3--12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2666142}, doi = {10.1145/2666141.2666142}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Jin14, author = {Yier Jin}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Embedded System Security in Smart Consumer Electronics}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {59}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2673888}, doi = {10.1145/2666141.2673888}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Jin14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Kim14, author = {Tiffany Hyun{-}Jin Kim}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Challenges of Establishing Trust in Online Entities and Beyond}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {49}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2668385}, doi = {10.1145/2666141.2668385}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Kim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrentzW14, author = {Konrad{-}Felix Krentz and Gerhard Wunder}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {13--22}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2666143}, doi = {10.1145/2666141.2666143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrentzW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NymanEA14, author = {Thomas Nyman and Jan{-}Erik Ekberg and N. Asokan}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Citizen Electronic Identities using {TPM} 2.0}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {37--48}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2666146}, doi = {10.1145/2666141.2666146}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NymanEA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Paar14, author = {Christof Paar}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {How to Build Hardware Trojans}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {57}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2668384}, doi = {10.1145/2666141.2668384}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Paar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Saarinen14, author = {Markku{-}Juhani Olavi Saarinen}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Simple {AEAD} Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {51--56}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2666144}, doi = {10.1145/2666141.2666144}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Saarinen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SadeghiD14, author = {Ahmad{-}Reza Sadeghi and Lucas Davi}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Beasty Memories: The Quest for Practical Defense against Code Reuse Attacks}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {23}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2668386}, doi = {10.1145/2666141.2668386}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SadeghiD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Tsudik14, author = {Gene Tsudik}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Challenges in Remote Attestation of Low-End Embedded Devices}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2668383}, doi = {10.1145/2666141.2668383}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Tsudik14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhaoZHQF14, author = {Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng}, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Providing Root of Trust for {ARM} TrustZone using On-Chip {SRAM}}, booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {25--36}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141.2666145}, doi = {10.1145/2666141.2666145}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhaoZHQF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014trusted, editor = {Gail{-}Joon Ahn and Frederik Armknecht and Jorge Guajardo}, title = {Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2666141}, doi = {10.1145/2666141}, isbn = {978-1-4503-3149-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AliSOJ13, author = {Syed Taha Ali and Vijay Sivaraman and Diethelm Ostry and Sanjay K. Jha}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Securing data provenance in body area networks using lightweight wireless link fingerprints}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {65--72}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517303}, doi = {10.1145/2517300.2517303}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AliSOJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BergSL13, author = {Robbert van den Berg and Boris Skoric and Vincent van der Leest}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Bias-based modeling and entropy analysis of PUFs}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {13--20}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517301}, doi = {10.1145/2517300.2517301}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BergSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoitHN13, author = {Christian Boit and Clemens Helfmeier and Dmitry Nedospasov}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Feasibly clonable functions}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {73--74}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2528523}, doi = {10.1145/2517300.2528523}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoitHN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DamGN13, author = {Mads Dam and Roberto Guanciale and Hamed Nemati}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Machine code verification of a tiny {ARM} hypervisor}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {3--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517302}, doi = {10.1145/2517300.2517302}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DamGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/EllouzeAARB13, author = {Nourhene Ellouze and Mohamed Allouche and Habib Ben Ahmed and Slim Rekhis and Noureddine Boudriga}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Securing implantable cardiac medical devices: use of radio frequency energy harvesting}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {35--42}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517307}, doi = {10.1145/2517300.2517307}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/EllouzeAARB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FanZAG13, author = {Xinxin Fan and Nusa Zidaric and Mark D. Aagaard and Guang Gong}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Efficient hardware implementation of the stream cipher {WG-16} with composite field arithmetic}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {21--34}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517305}, doi = {10.1145/2517300.2517305}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FanZAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HerrewegeLSKV13, author = {Anthony Van Herrewege and Vincent van der Leest and Andr{\'{e}} Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Secure {PRNG} seeding on commercial off-the-shelf microcontrollers}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {55--64}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517306}, doi = {10.1145/2517300.2517306}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HerrewegeLSKV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HillerWLBS13, author = {Matthias Hiller and Michael Weiner and Leandro Rodrigues Lima and Maximilian Birkner and Georg Sigl}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Breaking through fixed {PUF} block limitations with differential sequence coding and convolutional codes}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {43--54}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2517304}, doi = {10.1145/2517300.2517304}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HillerWLBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MerliP13, author = {Dominik Merli and Rainer Plaga}, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {Physical unclonable functions: devices for cryptostorage}, booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517300.2528524}, doi = {10.1145/2517300.2528524}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MerliP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013trusted, editor = {Ahmad{-}Reza Sadeghi and Frederik Armknecht and Jean{-}Pierre Seifert}, title = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin, Germany}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2517300}, isbn = {978-1-4503-2486-1}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013trusted.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.