Tsudik, Gene
90  Ergebnisse:
Personensuche X
?
1

The SA4P Framework: Sensing and Actuation as a Privilege:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
De Vaere, Piet ; Stöger, Felix ; Perrig, Adrian. - p. 873-885 , 2024
 
?
2

Element Distinctness and Bounded Input Size in Private Set ..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
3

Acoustic Side-Channel Attacks on a Computer Mouse:

, In: Detection of Intrusions and Malware, and Vulnerability Assessment; Lecture Notes in Computer Science,
 
?
4

ProvCam: A Camera Module with Self-Contained TCB for Produc..:

, In: Proceedings of the 30th Annual International Conference on Mobile Computing and Networking,
Liu, Yuxin (Myles) ; Yao, Zhihao ; Chen, Mingyi... - p. 588-602 , 2024
 
?
5

Poster: Control-Flow Integrity in Low-end Embedded Devices:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
 
?
6

Caveat (IoT) Emptor: Towards Transparency of IoT Device Pre..:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
 
?
7

$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust..:

, In: 2023 IEEE/ACM International Conference on Computer Aided Design (ICCAD),
 
?
8

Vronicle : verifiable provenance for videos from mobile ..:

, In: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services,
 
?
9

Privacy-Friendly De-authentication with BLUFADE: Blurred Fa..:

, In: 2022 IEEE International Conference on Pervasive Computing and Communications (PerCom),
 
?
10

CASU : Compromise Avoidance via Secure Update for Low-En..:

, In: Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design,
 
?
11

We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack ..:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
 
?
12

Vronicle : verifiable provenance for videos from mobile ..:

, In: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services,
 
?
13

SEDIMENT: An IoT-device-centric Methodology for Scalable 5G..:

, In: 2022 IEEE Wireless Communications and Networking Conference (WCNC),
 
?
14

Vronicle : verifiable provenance for videos from mobile ..:

, In: Proceedings of the 20th Annual International Conference on Mobile Systems, Applications and Services,
 
?
 
1-15