Követés
Thomas Nyman
Thomas Nyman
L M Ericsson
E-mail megerősítve itt: ericsson.com - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
C-FLAT: control-flow attestation for embedded systems software
T Abera, N Asokan, L Davi, JE Ekberg, T Nyman, A Paverd, AR Sadeghi, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3812016
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication
H Liljestrand, T Nyman, K Wang, CC Perez, JE Ekberg, N Asokan
28th USENIX Security Symposium (USENIX Security 2019), 177-194, 2019
1912019
LO-FAT: Low-overhead control flow attestation in hardware
G Dessouky, S Zeitouni, T Nyman, A Paverd, L Davi, P Koeberl, N Asokan, ...
Proceedings of the 54th Annual Design Automation Conference 2017, 1-6, 2017
1612017
Open-TEE - An Open Virtual Trusted Execution Environment
B McGillion, T Dettenborn, T Nyman, N Asokan
2015 IEEE Trustcom/BigDataSE/ISPA 1, 400-407, 2015
1312015
ASSURED: Architecture for secure software update of realistic embedded devices
N Asokan, T Nyman, N Rattanavipanon, AR Sadeghi, G Tsudik
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2018
1062018
Security of OS-level virtualization technologies
E Reshetova, J Karhunen, T Nyman, N Asokan
Nordic Conference on Secure IT Systems, 77-93, 2014
962014
CFI CaRE: Hardware-supported call and return enforcement for commercial microcontrollers
T Nyman, JE Ekberg, L Davi, N Asokan
Research in Attacks, Intrusions, and Defenses: 20th International Symposium …, 2017
922017
Authenticated call stack
H Liljestrand, T Nyman, JE Ekberg, N Asokan
Proceedings of the 56th Annual Design Automation Conference 2019, 1-2, 2019
902019
Protecting the stack with PACed canaries
H Liljestrand, Z Gauhar, T Nyman, JE Ekberg, N Asokan
Proceedings of the 4th Workshop on System Software for Trusted Execution, 1-6, 2019
312019
Exploitation techniques and defenses for data-oriented attacks
L Cheng, H Liljestrand, MS Ahmed, T Nyman, T Jaeger, N Asokan, D Yao
2019 IEEE Cybersecurity Development (SecDev), 114-128, 2019
292019
Exploitation techniques for data-oriented attacks with existing and potential defense approaches
L Cheng, S Ahmed, H Liljestrand, T Nyman, H Cai, T Jaeger, N Asokan, ...
ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-36, 2021
272021
Hardscope: Thwarting DOP with hardware-assisted run-time scope enforcement
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
arXiv preprint arXiv:1705.10295, 2017
262017
Characterizing SEAndroid policies in the wild
E Reshetova, F Bonazzi, T Nyman, R Borgaonkar, N Asokan
arXiv preprint arXiv:1510.05497, 2015
242015
Citizen electronic identities using TPM 2.0
T Nyman, JE Ekberg, N Asokan
Proceedings of the 4th International Workshop on Trustworthy Embedded …, 2014
232014
HardScope: Hardening embedded systems against data-oriented attacks
T Nyman, G Dessouky, S Zeitouni, A Lehikoinen, A Paverd, N Asokan, ...
Proceedings of the 56th Annual Design Automation Conference 2019, 1-6, 2019
182019
Security of OS-level virtualization technologies: Technical report
E Reshetova, J Karhunen, T Nyman, N Asokan
arXiv preprint arXiv:1407.4245, 2014
182014
Hardware platform security for mobile devices
LJ Gunn, N Asokan, JE Ekberg, H Liljestrand, V Nayani, T Nyman
Foundations and Trends® in Privacy and Security 3 (3-4), 214-394, 2022
102022
On making emerging trusted execution environments accessible to developers
T Nyman, B McGillion, N Asokan
Trust and Trustworthy Computing: 8th International Conference, TRUST 2015 …, 2015
82015
Friend or foe inside? exploring in-process isolation to maintain memory safety for unsafe rust
M Gülmez, T Nyman, C Baumann, JT Mühlberg
2023 IEEE Secure Development Conference (SecDev), 54-66, 2023
42023
Rewind & Discard: Improving software resilience using isolated domains
M Gülmez, T Nyman, C Baumann, JT Mühlberg
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
42023
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20