default search action
5th TrustED@CCS 2015: Denver, Colorado, USA
- Indrajit Ray, Xiaofeng Wang, Kui Ren:
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015. ACM 2015, ISBN 978-1-4503-3828-8
Session 1: Hardware Security 1
- Marten van Dijk:
Hardware Security and its Adversaries. 1-2 - Ryan A. Scheel, Akhilesh Tyagi:
Characterizing Composite User-Device Touchscreen Physical Unclonable Functions (PUFs) for Mobile Device Authentication. 3-13 - André Schaller, Boris Skoric, Stefan Katzenbeisser:
On the Systematic Drift of Physically Unclonable Functions Due to Aging. 15-20 - Xin Ye, Mostafa Taha, Cong Chen, Thomas Eisenbarth:
Faster Leakage Detection and Exploitation. 21-29
Session 2: Hardware Security 2
- Yang Xie, Chongxi Bao, Ankur Srivastava:
Security-Aware Design Flow for 2.5D IC Technology. 31-38 - Geremy Condra:
A Plea for Incremental Work in IoT Security. 39
Session 3: System Security 1
- Jakub Szefer:
Leveraging Processor Performance Counters for Security and Performance. 41 - Alexandra Mikityuk, Stefan Pham, Stefan Kaiser, Oliver Friedrich, Stefan Arbanowski:
Content Protection in HTML5 TV Platforms: Towards Browser-agnostic DRM and Cloud UI Environments. 43-52
Session 4: System Security 2
- André Weimerskirch:
An Overview of Automotive Cybersecurity: Challenges and Solution Approaches. 53 - Jan Nordholz, Julian Vetter, Michael Peter, Matthias Junker-Petschick, Janis Danisevskis:
XNPro: Low-Impact Hypervisor-Based Execution Prevention on ARM. 55-64
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.