Author of the publication

OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform.

, , , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 412-438. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Transplantation Attack: Analysis and Prediction., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 367-374. Springer, (2014)SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions., , , , , and . MSN, page 387-394. IEEE, (2020)A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network., , , , and . MSN, page 818-824. IEEE, (2021)TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors., , , , , and . SenSys, page 271-284. ACM, (2020)ARPSSO: An OIDC-Compatible Privacy-Preserving SSO Scheme Based on RP Anonymization., , , , and . ESORICS (2), volume 14983 of Lecture Notes in Computer Science, page 268-288. Springer, (2024)Cache-in-the-Middle (CITM) Attacks: Manipulating Sensitive Data in Isolated Execution Environments., , , , , and . ACM Conference on Computer and Communications Security, page 1001-1015. ACM, (2020)Vulnerable Service Invocation and Countermeasures., , , , , , and . IEEE Trans. Dependable Secur. Comput., 18 (4): 1733-1750 (2021)OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform., , , , , and . ESORICS (2), volume 11736 of Lecture Notes in Computer Science, page 412-438. Springer, (2019)How to Block the Malicious Access to Android External Storage., , , , , and . ICISC, volume 11396 of Lecture Notes in Computer Science, page 287-303. Springer, (2018)SuiT: Secure User Interface Based on TrustZone., , , , and . ICC, page 1-7. IEEE, (2019)