Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Tsoupidi, Rodothea Myrsini"'
Cryptographic libraries, an essential part of cybersecurity, are shown to be susceptible to different types of attacks, including side-channel and memory-corruption attacks. In this article, we examine popular cryptographic libraries in terms of the
Externí odkaz:
http://arxiv.org/abs/2412.19310
Embedded devices are increasingly present in our everyday life. They often process critical information, and hence, rely on cryptographic protocols to achieve security. However, embedded devices remain vulnerable to attackers seeking to hijack their
Externí odkaz:
http://arxiv.org/abs/2304.13458
Autor:
Tsoupidi, Rodothea Myrsini, Lozano, Roberto Castañeda, Troubitsyna, Elena, Papadimitratos, Panagiotis
Side-channel attacks impose a serious threat to cryptographic algorithms, including widely employed ones, such as AES and RSA. These attacks take advantage of the algorithm implementation in hardware or software to extract secret information via side
Externí odkaz:
http://arxiv.org/abs/2207.02614
Modern software deployment process produces software that is uniform and hence vulnerable to large-scale code-reuse attacks, such as Jump-Oriented Programming (JOP) attacks. Compiler-based diversification improves the resilience of software systems b
Externí odkaz:
http://arxiv.org/abs/2111.09934
This paper explores the use of relational symbolic execution to counter timing side channels in WebAssembly programs. We design and implement Vivienne, an open-source tool to automatically analyze WebAssembly cryptographic libraries for constant-time
Externí odkaz:
http://arxiv.org/abs/2109.01386
Modern software deployment process produces software that is uniform, and hence vulnerable to large-scale code-reuse attacks. Compiler-based diversification improves the resilience and security of software systems by automatically generating differen
Externí odkaz:
http://arxiv.org/abs/2007.08955
Autor:
Tsoupidi, Rodothea Myrsini
The estimation of the worst-case execution time (WCET) of a task is a problem that concerns the field of embedded systems and, especially, real-time systems. Estimating a safe WCET for single-core architectures without speculative mechanisms is a cha
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222362
Autor:
Tsoupidi, Rodothea Myrsini
The increased digitalization of modern societies has resulted in a proliferation of a broad spectrum of embedded devices, ranging from personal smartphones and heart pacemakers to large-scale industrial IoT systems. Since they often handle various se
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od_______260::9365bd32e9c9202956c7776f8b36ec7a
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-326717
http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-326717
Autor:
Tsoupidi, Rodothea-Myrsini, Kanellos, Ilias, Vergoulis, Thanasis, Vlachos, Ioannis S., Hatzigeorgiou, Artemis G., Dalamagas, Theodore
Publikováno v:
ACM International Conference Proceeding Series; 6/29/2015, p1-5, 5p