Search dblp for Publications

export results for "toc:db/conf/ccs/trusted2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/Condra15,
  author       = {Geremy Condra},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {A Plea for Incremental Work in IoT Security},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {39},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808424},
  doi          = {10.1145/2808414.2808424},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Condra15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dijk15,
  author       = {Marten van Dijk},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Hardware Security and its Adversaries},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808422},
  doi          = {10.1145/2808414.2808422},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Dijk15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MikityukPKFA15,
  author       = {Alexandra Mikityuk and
                  Stefan Pham and
                  Stefan Kaiser and
                  Oliver Friedrich and
                  Stefan Arbanowski},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Content Protection in {HTML5} {TV} Platforms: Towards Browser-agnostic
                  {DRM} and Cloud {UI} Environments},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {43--52},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808416},
  doi          = {10.1145/2808414.2808416},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MikityukPKFA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NordholzVPJD15,
  author       = {Jan Nordholz and
                  Julian Vetter and
                  Michael Peter and
                  Matthias Junker{-}Petschick and
                  Janis Danisevskis},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {XNPro: Low-Impact Hypervisor-Based Execution Prevention on {ARM}},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808415},
  doi          = {10.1145/2808414.2808415},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NordholzVPJD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchallerS015,
  author       = {Andr{\'{e}} Schaller and
                  Boris Skoric and
                  Stefan Katzenbeisser},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {On the Systematic Drift of Physically Unclonable Functions Due to
                  Aging},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {15--20},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808417},
  doi          = {10.1145/2808414.2808417},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchallerS015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ScheelT15,
  author       = {Ryan A. Scheel and
                  Akhilesh Tyagi},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Characterizing Composite User-Device Touchscreen Physical Unclonable
                  Functions (PUFs) for Mobile Device Authentication},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {3--13},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808418},
  doi          = {10.1145/2808414.2808418},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ScheelT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Szefer15,
  author       = {Jakub Szefer},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Leveraging Processor Performance Counters for Security and Performance},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {41},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808421},
  doi          = {10.1145/2808414.2808421},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Szefer15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Weimerskirch15,
  author       = {Andr{\'{e}} Weimerskirch},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {An Overview of Automotive Cybersecurity: Challenges and Solution Approaches},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {53},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808423},
  doi          = {10.1145/2808414.2808423},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Weimerskirch15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieBS15,
  author       = {Yang Xie and
                  Chongxi Bao and
                  Ankur Srivastava},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Security-Aware Design Flow for 2.5D {IC} Technology},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {31--38},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808420},
  doi          = {10.1145/2808414.2808420},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XieBS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YeTCE15,
  author       = {Xin Ye and
                  Mostafa Taha and
                  Cong Chen and
                  Thomas Eisenbarth},
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Faster Leakage Detection and Exploitation},
  booktitle    = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414.2808419},
  doi          = {10.1145/2808414.2808419},
  timestamp    = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YeTCE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015trusted,
  editor       = {Indrajit Ray and
                  Xiaofeng Wang and
                  Kui Ren},
  title        = {Proceedings of the 5th International Workshop on Trustworthy Embedded
                  Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2808414},
  doi          = {10.1145/2808414},
  isbn         = {978-1-4503-3828-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2015trusted.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics