Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Job Noorman"'
Autor:
Gianluca Scopelliti, Sepideh Pouyanrad, Job Noorman, Fritz Alder, Christoph Baumann, Frank Piessens, Jan Tobias Mühlberg
This paper presents an approach to provide strong assurance of the secure execution of distributed event-driven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon and extend security primitives prov
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f81507b996110abd421be0056c8c3abc
Autor:
Job Noorman, Sepideh Pouyanrad, Gianluca Scopelliti, Fritz Alder, Frank Piessens, Jan Tobias Mühlberg
Publikováno v:
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
CCS
CCS
We present an integrated open-source framework to develop, deploy, and use event-driven distributed enclaved applications across heterogeneous Trusted Execution Environments (TEEs). Our framework strives for strong application authenticity and integr
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b72b3d650d973a8d2a587f83e1f354ec
https://lirias.kuleuven.be/handle/123456789/685462
https://lirias.kuleuven.be/handle/123456789/685462
Autor:
Pierpaolo Degano, Job Noorman, Frank Piessens, Letterio Galletta, Matteo Busi, Jo Van Bulck, Jan Tobias Mühlberg
Publikováno v:
2020 IEEE 33rd Computer Security Foundations Symposium (CSF)
CSF
CSF
Computer systems often provide hardware support for isolation mechanisms like privilege levels, virtual memory, or enclaved execution. Over the past years, several successful software-based side-channel attacks have been developed that break, or at l
Publikováno v:
REBLS@SPLASH
© 2017 Association for Computing Machinery. With Internet of Things applications growing in size and popularity, physical sensor networks are more often running multiple complex applications. It becomes increasingly important to maintain these event
Publikováno v:
Security and Trust Management ISBN: 9783319680620
STM
STM
This paper presents an approach to provide strong assurance of the secure execution of distributed event-driven applications on shared infrastructures, while relying on a small Trusted Computing Base. We build upon and extend security primitives prov
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f100c34c818d299a500ab2ab44a30b3f
https://lirias.kuleuven.be/handle/123456789/616896
https://lirias.kuleuven.be/handle/123456789/616896
Autor:
Jo Van Bulck, Felix C. Freiling, Pieter Maene, Ingrid Verbauwhede, Job Noorman, Tilo Müller, Jan Tobias Mühlberg, Frank Piessens, Johannes Götzfried, Bart Preneel
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX Security conference. It supports remote (even third-party) software installation on devices while maintaining strong security guarantees. More specific
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b44912a5aefa53d71bbf78ca3119daa9
https://lirias.kuleuven.be/handle/123456789/588194
https://lirias.kuleuven.be/handle/123456789/588194
Publikováno v:
MODULARITY (Companion)
© 2016 ACM. Protected Module Architectures are a new brand of security architectures whose main objective is to support the secure isolated execution of software modules with a minimal Trusted Computing Base (TCB) - several prototypes for embedded s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ce144cec4143afcce3f9ce5ff9e4cb79
https://lirias.kuleuven.be/handle/123456789/538055
https://lirias.kuleuven.be/handle/123456789/538055
Publikováno v:
Information Security Theory and Practice ISBN: 9783319240176
WISTP
WISTP
© IFIP International Federation for Information Processing 2015. Low-end embedded devices and the Internet of Things (IoT) are becoming increasingly important for our lives. They are being used in domains such as infrastructure management, and medic
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9a85d22bff9f6bfe1490b027b77a7b18
https://lirias.kuleuven.be/handle/123456789/513666
https://lirias.kuleuven.be/handle/123456789/513666
Publikováno v:
Computer Security--ESORICS 2015 ISBN: 9783319241739
ESORICS (1)
ESORICS (1)
In this paper we describe a novel approach to securely obtain measurements with respect to the integrity of software running on a low-cost and low-power computing node autonomously or on request. We propose to use these measurements as an indication
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6954f5cd13f12eda69bdb3f451c783f2
https://doi.org/10.1007/978-3-319-24174-6_26
https://doi.org/10.1007/978-3-319-24174-6_26
Publikováno v:
ISSE 2013 Securing Electronic Business Processes ISBN: 9783658033705
ISSE
ISSE
A significant fraction of Internet-connected computing devices is infected with malware. With the increased connectivity and software extensibility of embedded and industrial devices, this threat is now also relevant for our industrial infrastructure
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::585b713e5ed82facd3fe23921e4322d1
https://doi.org/10.1007/978-3-658-03371-2_21
https://doi.org/10.1007/978-3-658-03371-2_21