TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 46.

Kiss, Ágnes and Naderpour, Masoud and Liu, Jian and Asokan, N. and Schneider, Thomas :
SoK: Modular and Efficient Private Decision Tree Evaluation.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2
[Article] , (2019)

Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza :
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
In: DAC 2019, June, 2.-6., Las Vegas, USA.
[Conference or Workshop Item] , (2019)

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. :
AuDI: Towards autonomous IoT device-type identification using periodic communications.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8511]
In: IEEE Journal on Selected Areas in Communications ISSN 0733-8716
[Article] , (2019)

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Fereidooni, Hossein and Asokan, N. and Sadeghi, Ahmad-Reza :
DÏoT: A Federated Self-learning Anomaly Detection System for IoT.
The 39th IEEE International Conference on Distributed Computing Systems (ICDCS 2019)
[Conference or Workshop Item] , (2019)

Truong, Hien Thi Thu and Toivonen, Juhani and Nguyen, Thien Duc and Soriente, Claudio and Tarkoma, Sasu and Asokan, N. :
DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification.
In: IEEE International Conference on Pervasive Computing and Communications (PerCom2019), March 2019, Kyoto, Japan.
[Conference or Workshop Item] , (2019)

Marchal, Samuel and Miettinen, Markus and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Asokan, N. :
AUDI: Towards Autonomous IoT Device-Type Identification.
In: IEEE Journal on Selected Areas in Communications (JSAC) on Artificial Intelligence and Machine Learning for Networking and Communications
[Article] , (2019)

Asokan, N. and Nyman, Thomas and Rattanavipanon, Norrathep and Sadeghi, Ahmad-Reza and Tsudik, Gene :
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems - Special Issue ESWEEK 2018, CASES 2018, CODES + ISSS 2018 and EMSOFT 2018
[Article] , (2018)

Miettinen, Markus and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza :
Revisiting Context-Based Pairing in IoT.
In: 55th Design Automation Conference (DAC), 24.-29.06. 2018, San Francisco, CA, USA. Proceedings of the 55th Design Automation Conference (DAC) ACM
[Conference or Workshop Item] , (2018)

Asokan, N. and Miettinen, Markus :
Ad-Hoc Key Agreement: a Brief History and the Challenges Ahead.
[Online-Edition: http://www.sciencedirect.com/science/article/pii/S0140366418...]
In: Computer Communications ISSN 0140-3664
[Article] , (2018) (In Press)

Nguyen, Thien Duc and Marchal, Samuel and Miettinen, Markus and Dang, Minh Hoang and Asokan, N. and Sadeghi, Ahmad-Reza :
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.
[Online-Edition: http://arxiv.org/abs/1804.07474]
In: CoRR, abs/1804.07474
[Article] , (2018)

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep :
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.
[Online-Edition: https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=832...]
In: IEEE Internet Computing p. 1. ISSN 1089-7801
[Article] , (2018)

Asokan, N. and Nguyen, Thien Duc and Tarkoma, Sasu and Toivonen, Juhani and Truong, Hien Thi Thu :
Proximity Verification Based on Acoustic Room Impulse Response.
[Online-Edition: http://arxiv.org/abs/1803.07211]
In: CoRR, abs/1803.07211
[Article] , (2018)

Liu, Jian and Juuti, Mika and Lu, Yao and Asokan, N. :
Oblivious Neural Network Predictions via MiniONN Transformations.
In: ACM CCS 2017, ACM Conference on Computer and Communications Security
[Conference or Workshop Item] , (2017)

Marchal, Samuel and Armano, Giovanni and Gröndahl, Tommi and Saari, Kalle and Singh, Nidhi and Asokan, N. :
Off-the-Hook: An Efficient and Usable Client-Side Phishing Prevention Application.
In: IEEE Transactions on Computers , 66 (10)
[Conference or Workshop Item] , (2017)

Kiss, Ágnes and Liu, Jian and Schneider, Thomas and Asokan, N. and Pinkas, Benny :
Private Set Intersection for Unequal Set Sizes with Mobile Applications.
In: Proceedings on Privacy Enhancing Technologies (PoPETs), 2017 (4) pp. 177-197.
[Article] , (2017)

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Frassetto, Tommaso and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu :
IoT Sentinel Demo: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017) IEEE
[Conference or Workshop Item] , (2017)

Miettinen, Markus and Marchal, Samuel and Hafeez, Ibbad and Asokan, N. and Sadeghi, Ahmad-Reza and Tarkoma, Sasu :
IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT.
Proc. 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017)
[Conference or Workshop Item] , (2017)

Dessouky, Ghada and Zeitouni, Shaza and Nyman, Thomas and Paverd, Andrew and Davi, Lucas and Koeberl, Patrick and Asokan, N. and Sadeghi, Ahmad-Reza :
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
In: 54th Design Automation Conference (DAC'17).
[Conference or Workshop Item] , (2017)

Tamrakar, Sandeep and Liu, Jian and Paverd, Andrew and Ekberg, Jan-Erik and Pinkas, Benny and Asokan, N. :
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security
[Conference or Workshop Item] , (2017)

Nyman, Thomas and Dessouky, Ghada and Zeitouni, Shaza and Lehikoinen, Aaro and Paverd, Andrew and Asokan, N. and Sadeghi, Ahmad-Reza :
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
[Online-Edition: http://arxiv.org/abs/1705.10295]
In: Cryptography and Security, abs/1705.10295
[Article] , (2017)

Abera, Tigist and Asokan, N. and Davi, Lucas and Ekberg, Jan-Erik and Nyman, Thomas and Paverd, Andrew and Sadeghi, Ahmad-Reza and Tsudik, Gene :
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
23rd ACM Conference on Computer and Communications Security (CCS)
[Conference or Workshop Item] , (2016)

Abera, Tigist and Asokan, N. and Davi, Lucas and Koushanfar, Farinaz and Praverd, Andrew and Tsudik, Gene and Sadeghi, Ahmad-Reza :
Things, Trouble, Trust: On Building Trust in IoT Systems.
53rd Design Automation Conference (DAC)
[Conference or Workshop Item] , (2016)

Miettinen, Markus and Huang, Jialin and Nguyen, Thien Duc and Asokan, N. and Sadeghi, Ahmad-Reza :
Poster: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.
Proc. 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec'16)
[Conference or Workshop Item] , (2016)

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian :
SEDA: Scalable Embedded Device Attestation.
22nd ACM Conference on Computer and Communications Security (CCS)
[Conference or Workshop Item] , (2015)

Nyman, Thomas and McGillion, Brian and Asokan, N. :
On Making Emerging Trusted Execution Environments Accessible to Developers.
In: Lecture Notes in Computer Science , 9229 . Springer International Publishing
[Conference or Workshop Item] , (2015)

Asokan, N. and Brasser, Ferdinand and Ibrahim, Ahmad and Sadeghi, Ahmad-Reza and Schunter, Matthias and Tsudik, Gene and Wachsmann, Christian :
SEDA - Technical Report.

[Report] , (2015)

Nagy, Marcin and Bui, Thanh Phong and Cristofaro, Emiliano De and Asokan, N. and Ott, Jörg and Sadeghi, Ahmad-Reza :
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL.
ACM WiSEC 2015
[Conference or Workshop Item] , (2015)

Miettinen, Markus and Asokan, N. and Koushanfar, Farinaz and Nguyen, Thien Duc and Rios, Jon and Sadeghi, Ahmad-Reza and Sobhani, Majid and Yellapantula, Sudha :
I know where you are: Proofs of Presence resilient to malicious provers.
10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)
[Conference or Workshop Item] , (2015)

Asokan, N. and Gröndahl, Tommi and Nguyen, Hoang Long and Nguyen, Thien Duc and Paverd, Andrew and Pendyala, Praveen Kumar and Sadeghi, Ahmad-Reza and Stobert, Elizabeth and Tamrakar, Sandeep :
OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices.
[Online-Edition: https://arxiv.org/pdf/1511.02119.pdf]
In: CoRR, abs/1511.02119
[Article] , (2015)

Miettinen, Markus and Asokan, N. and Nguyen, Thien Duc and Sadeghi, Ahmad-Reza and Sobhani, Majid :
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices.
Proc. ACM Conference on Computer and Communications Security ACM
[Conference or Workshop Item] , (2014)

Asokan, N. and Ekberg, Jan-Erik and Kostiainen, Kari and Rajan, Anand and Rozas, Carlos and Sadeghi, Ahmad-Reza and Schulz, Steffen and Wachsmann, Christian :
Mobile Trusted Computing.
In: Proceedings of the IEEE, 102 (8) pp. 1189-1206.
[Article] , (2014)

Nyman, Thomas and Ekberg, Jan-Erik and Asokan, N. :
Citizen Electronic Identities using {TPM} 2.0.
In: CoRR, abs/1409.1023
[Article] , (2014)

Ekberg, Jan-Erik and Kostiainen, Kari and Asokan, N. :
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
In: Security Privacy, IEEE, 12 (4) pp. 29-37.
[Article] , (2014)

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. :
ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award).
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014)
[Conference or Workshop Item] , (2014)

Lagerspetz, E. and Truong, Hien Thi Thu and Tarkoma, S. and Asokan, N. :
MDoctor: A Mobile Malware Prognosis Application.
Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on
[Conference or Workshop Item] , (2014)

Nagy, Marcin and Cristofaro, Emiliano De and Dmitrienko, Alexandra and Asokan, N. and Sadeghi, Ahmad-Reza :
Do I know you? – Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications.
Annual Computer Security Applications Conference (ACSAC 2013)
[Conference or Workshop Item] , (2013)

Asokan, N. and Davi, Lucas and Dmitrienko, Alexandra and Heuser, Stephan and Kostiainen, Kari and Reshetova, Elena and Sadeghi, Ahmad-Reza:
Mobile Platform Security.
Synthesis Lectures on Information Security, Privacy, and Trust, 4 (3). Morgan & Claypool
[Book] , (2013)

Miettinen, Markus and Heuser, Stephan and Kronz, Wiebke and Sadeghi, Ahmad-Reza and Asokan, N. :
ConXsense – Context Sensing for Adaptive Usable Access Control.

[Report] , (2013)

Asokan, N. and Dmitrienko, Alexandra and Nagy, Marcin and Reshetova, Elena and Sadeghi, Ahmad-Reza and Schneider, Thomas and Stelle, Stanislaus :
CrowdShare: Secure Mobile Resource Sharing.
11. International Conference on Applied Cryptography and Network Security (ACNS'13) Springer
[Conference or Workshop Item] , (2013)

Gupta, Aditi and Miettinen, Markus and Asokan, N. and Nagy, Marcin :
Intuitive Security Policy Configuration in Mobile Devices Using Context Profiling.
2012 International Conference on Privacy, Security, Risk and Trust (PASSAT), and 2012 International Confernece on Social Computing (SocialCom) IEEE
[Conference or Workshop Item] , (2012)

Gupta, Aditi and Miettinen, Markus and Asokan, N. :
Using context-profiling to aid in access control decisions on mobile devices.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)
[Conference or Workshop Item] , (2011)

Kostiainen, Kari and Dmitrienko, Alexandra and Ekberg, Jan-Erik and Sadeghi, Ahmad-Reza and Asokan, N. :
Key Attestation from Trusted Execution Environments.
TRUST 2010: Proceedings of the 3rd International Conference on Trust and Trustworthy Computing
[Conference or Workshop Item] , (2010)

Miettinen, Markus and Asokan, N. :
Towards security policy decisions based on context profiling.
In: AISec '10 . ACM
[Conference or Workshop Item] , (2010)

Sadeghi, Ahmad-Reza and Stüble, André and Wolf, Marko and Asokan, N. :
Securing Peer-to-Peer Distributions for Mobile Devices.
In: 4th Information Security Practice and Experience Conference (ISPEC 2008).
[Conference or Workshop Item] , (2008)

Asokan, N. and Gasmi, Yacine and Sadeghi, Ahmad-Reza and Stewin, Patrick and Unger, Martin :
Beyond Secure Channels.
In: ACM Workshop on Scalable Trusted Computing (ACMSTC 2007). ACM Press
[Conference or Workshop Item] , (2007)

Sadeghi, Ahmad-Reza and Wolf, Christopher and Stüble, Christian and Asokan, N. and Ekberg, Jan-Erik :
Enabling Fairer Digital Rights Management with Trusted Computing.
In: LNCS , 4779 . Springer Verlag
[Conference or Workshop Item] , (2007)

This list was generated on Sat Apr 20 01:09:42 2019 CEST.