copyright reference: Thomas Ott / TU Darmstadt

Publications (work in progress)

Displaying results 1 to 18 out of 18

Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems
Altaf Shaik, Jean-Pierre Seifert, Ravishankar Borgaonkar, N. Asokan, Valtteri Niemi
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), February 2016.

Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks
Otto Huhta, Swapnil Udar, Mika Juuti, Prakash Shrestha, Nitesh Saxena, N. Asokan
In: 23rd Annual Network & Distributed System Security Symposium (NDSS), February 2016.

Characterizing SEAndroid Policies in the Wild
Elena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan
In: International Conference on Information Systems Security and Privacy (ICISSP), February 2016.

Secure Deduplication of Encrypted Data without Additional Independent Servers
Jian Liu, N. Asokan, Benny Pinkas
In: 22nd ACM Conference on Computer and Communications Security (CCS), October 2015.

Checksum Gestures: Continuous Gestures as an Out-of-Band Channel for Secure Pairing
Imtiaj Ahmad, Yina Ye, Sourav Bhattacharya, N. Asokan, Giulio Jacucci, Petteri Nurmi, Sasu Tarkoma
In: The 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2015), September 2015.

LookAhead: Augmenting Crowdsourced Website Reputation Systems by Prediction of Eventual Rating
Sourav Bhattacharya, Otto Huhta,,N. Asokan
In: Lecture Notes in Computer Science, 8th International Conference on Trust & Trustworthy Computing, vol. 9229, p. 143-162, Springer International Publishing, August 2015. ISBN 978-3-319-22845-7.
http://dx.doi.org/10.1007/978-3-319-22846-4_9.

On Making Emerging Trusted Execution Environments Accessible to Developers
Thomas Nyman, Brian McGillion,N. Asokan
In: Lecture Notes in Computer Science, 8th International Conference on Trust & Trustworthy Computing, vol. 9229, p. 58-67, Springer International Publishing, August 2015. ISBN 978-3-319-22845-7.
http://dx.doi.org/10.1007/978-3-319-22846-4_4.

On Rehoming the Electronic Id to TEEs
Sandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), August 2015.

Open-TEE - An Open Virtual Trusted Execution Environment
Brian McGillion, Tanel Dettenborn, Thomas Nyman,,N. Asokan
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), August 2015.

You are AIRing too much: Assessing the privacy of users in crowdsourcing environmental data
Julien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), August 2015.

Private Membership Test for Bloom Filters
Tommi Meskanen, Jian Liu, Sara Ramezanian, Valtteri Niemi
In: The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15), August 2015.

How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Marcin Nagy, Thanh Bui, Emiliano De Cristofaro,N. Asokan, Jörg Ott, Ahmad-Reza Sadeghi
In: ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2015), June 2015.

Citizen Electronic Identities using TPM 2.0
Thomas Nyman, Jan-Erik Ekberg, N. Asokan
In: CoRR, vol. abs/1409.1023, July 2014.
http://arxiv.org/abs/1409.1023.

The Untapped Potential of Trusted Execution Environments on Mobile Devices
J.-E. Ekberg ,K. Kostiainen, N. Asokan
In: Security Privacy, IEEE, vol. 12, no. 4, p. 29-37, July 2014. ISSN 1540-7993.
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6799152.

On Mobile Malware Infections
N. Asokan
In: WiSec '14, Proceedings of the 2014 ACM Conference on Security and Privacy in Wireless Mobile Networks, p. 37--38, ACM, July 2014. ISBN 978-1-4503-2972-9.
http://doi.acm.org/10.1145/2627393.2627420.

MDoctor: A Mobile Malware Prognosis Application
E. Lagerspetz, Hien Thi Thu Truong, S. Tarkoma, N. Asokan
In: Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on, p. 201-206, June 2014. ISSN 1545-0678.
http://ieeexplore.ieee.org/xpls/icp.jsp?arnumber=6888862.

The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators
Hien Thi Thu Truong, Eemil Lagerspetz, Petteri Nurmi, Adam J. Oliner, Sasu Tarkoma, N. Asokan, Sourav Bhattacharya
In: WWW '14, Proceedings of the 23rd International Conference on World Wide Web, p. 39--50, International World Wide Web Conferences Steering Committee, April 2014. ISBN 978-1-4503-2744-2.
http://dx.doi.org/10.1145/2566486.2568046.

Security of OS-Level Virtualization Technologies
Elena Reshetova, Janne Karhunen, Thomas Nyman, N. Asokan
In: Secure IT Systems - Lecture Notes in Computer Science, Springer International Publishing, January 2014.
http://link.springer.com/chapter/10.1007%2F978-3-319-11599-3_5#.