Search dblp for Publications

export results for "stream:streams/conf/trusted-ws:"

 download as .bib file

@inproceedings{DBLP:conf/ccs/Costin16,
  author    = {Andrei Costin},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Security of {CCTV} and Video Surveillance Systems: Threats, Vulnerabilities,
               Attacks, and Mitigations},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {45--54},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995290},
  doi       = {10.1145/2995289.2995290},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Costin16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DurmuthOP16,
  author    = {Markus D{\"{u}}rmuth and
               David Oswald and
               Niklas Pastewka},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Side-Channel Attacks on Fingerprint Matching Algorithms},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {3--13},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995294},
  doi       = {10.1145/2995289.2995294},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/DurmuthOP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Francillon16,
  author    = {Aur{\'{e}}lien Francillon},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Analyzing Thousands of Firmware Images and a Few Physical Devices:
               What's Next?},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {1},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995296},
  doi       = {10.1145/2995289.2995296},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Francillon16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GaebelZLH16,
  author    = {Ethan Gaebel and
               Ning Zhang and
               Wenjing Lou and
               Y. Thomas Hou},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Looks Good To Me: Authentication for Augmented Reality},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {57--67},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995295},
  doi       = {10.1145/2995289.2995295},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/GaebelZLH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HillerOSB16,
  author    = {Matthias Hiller and
               Aysun Gurur {\"{O}}nalan and
               Georg Sigl and
               Martin Bossert},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Online Reliability Testing for {PUF} Key Derivation},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {15--22},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995293},
  doi       = {10.1145/2995289.2995293},
  timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/HillerOSB16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuthGDVG16,
  author    = {Christopher Huth and
               Ren{\'{e}} Guillaume and
               Paul Duplys and
               Kumaragurubaran Velmurugan and
               Tim G{\"{u}}neysu},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {On the Energy Cost of Channel Based Key Agreement},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {31--41},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995291},
  doi       = {10.1145/2995289.2995291},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/HuthGDVG16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Medwed16,
  author    = {Marcel Medwed},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {IoT Security Challenges and Ways Forward},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {55},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995298},
  doi       = {10.1145/2995289.2995298},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Medwed16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Oswald16,
  author    = {David F. Oswald},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Wireless Attacks on Automotive Remote Keyless Entry Systems},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {43--44},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995297},
  doi       = {10.1145/2995289.2995297},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Oswald16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ToriiYM16,
  author    = {Naoya Torii and
               Dai Yamamoto and
               Tsutomu Matsumoto},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Evaluation of Latch-based Physical Random Number Generator Implementation
               on 40 nm ASICs},
  booktitle = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  pages     = {23--30},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289.2995292},
  doi       = {10.1145/2995289.2995292},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ToriiYM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016trusted,
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Mathias Payer and
               Stefan Mangard and
               Xinxin Fan and
               Tim G{\"{u}}neysu},
  title     = {Proceedings of the 6th International Workshop on Trustworthy Embedded
               Devices, TrustED@CCS 16, Vienna, Austria, October 28, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2995289},
  doi       = {10.1145/2995289},
  isbn      = {978-1-4503-4567-5},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2016trusted.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Condra15,
  author    = {Geremy Condra},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {A Plea for Incremental Work in IoT Security},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {39},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808424},
  doi       = {10.1145/2808414.2808424},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Condra15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Dijk15,
  author    = {Marten van Dijk},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Hardware Security and its Adversaries},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {1--2},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808422},
  doi       = {10.1145/2808414.2808422},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Dijk15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MikityukPKFA15,
  author    = {Alexandra Mikityuk and
               Stefan Pham and
               Stefan Kaiser and
               Oliver Friedrich and
               Stefan Arbanowski},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Content Protection in {HTML5} {TV} Platforms: Towards Browser-agnostic
               {DRM} and Cloud {UI} Environments},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {43--52},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808416},
  doi       = {10.1145/2808414.2808416},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/MikityukPKFA15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NordholzVPJD15,
  author    = {Jan C. Nordholz and
               Julian Vetter and
               Michael Peter and
               Matthias Junker{-}Petschick and
               Janis Danisevskis},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {XNPro: Low-Impact Hypervisor-Based Execution Prevention on {ARM}},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {55--64},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808415},
  doi       = {10.1145/2808414.2808415},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/NordholzVPJD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchallerS015,
  author    = {Andr{\'{e}} Schaller and
               Boris Skoric and
               Stefan Katzenbeisser},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {On the Systematic Drift of Physically Unclonable Functions Due to
               Aging},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {15--20},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808417},
  doi       = {10.1145/2808414.2808417},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/SchallerS015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ScheelT15,
  author    = {Ryan A. Scheel and
               Akhilesh Tyagi},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Characterizing Composite User-Device Touchscreen Physical Unclonable
               Functions (PUFs) for Mobile Device Authentication},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {3--13},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808418},
  doi       = {10.1145/2808414.2808418},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ScheelT15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Szefer15,
  author    = {Jakub Szefer},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Leveraging Processor Performance Counters for Security and Performance},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {41},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808421},
  doi       = {10.1145/2808414.2808421},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Szefer15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Weimerskirch15,
  author    = {Andr{\'{e}} Weimerskirch},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {An Overview of Automotive Cybersecurity: Challenges and Solution Approaches},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {53},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808423},
  doi       = {10.1145/2808414.2808423},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Weimerskirch15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XieBS15,
  author    = {Yang Xie and
               Chongxi Bao and
               Ankur Srivastava},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Security-Aware Design Flow for 2.5D {IC} Technology},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {31--38},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808420},
  doi       = {10.1145/2808414.2808420},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/XieBS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YeTCE15,
  author    = {Xin Ye and
               Mostafa Taha and
               Cong Chen and
               Thomas Eisenbarth},
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Faster Leakage Detection and Exploitation},
  booktitle = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  pages     = {21--29},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414.2808419},
  doi       = {10.1145/2808414.2808419},
  timestamp = {Fri, 08 Mar 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/YeTCE15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015trusted,
  editor    = {Indrajit Ray and
               Xiaofeng Wang and
               Kui Ren},
  title     = {Proceedings of the 5th International Workshop on Trustworthy Embedded
               Devices, TrustED 2015, Denver, Colorado, USA, October 16, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808414},
  doi       = {10.1145/2808414},
  isbn      = {978-1-4503-3828-8},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2015trusted.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaoS14,
  author    = {Chongxi Bao and
               Ankur Srivastava},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {A Secure Algorithm for Task Scheduling against Side-channel Attacks},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {3--12},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2666142},
  doi       = {10.1145/2666141.2666142},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BaoS14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jin14,
  author    = {Yier Jin},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Embedded System Security in Smart Consumer Electronics},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {59},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2673888},
  doi       = {10.1145/2666141.2673888},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Jin14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Kim14,
  author    = {Tiffany Hyun{-}Jin Kim},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Challenges of Establishing Trust in Online Entities and Beyond},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {49},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2668385},
  doi       = {10.1145/2666141.2668385},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Kim14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrentzW14,
  author    = {Konrad{-}Felix Krentz and
               Gerhard Wunder},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {6LoWPAN Security: Avoiding Hidden Wormholes using Channel Reciprocity},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {13--22},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2666143},
  doi       = {10.1145/2666141.2666143},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/KrentzW14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NymanEA14,
  author    = {Thomas Nyman and
               Jan{-}Erik Ekberg and
               N. Asokan},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Citizen Electronic Identities using {TPM} 2.0},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {37--48},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2666146},
  doi       = {10.1145/2666141.2666146},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/NymanEA14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Paar14,
  author    = {Christof Paar},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {How to Build Hardware Trojans},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {57},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2668384},
  doi       = {10.1145/2666141.2668384},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Paar14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Saarinen14,
  author    = {Markku{-}Juhani Olavi Saarinen},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Simple {AEAD} Hardware Interface (S{\AE}HI) in a SoC: Implementing
               an On-Chip Keyak/WhirlBob Coprocessor},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {51--56},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2666144},
  doi       = {10.1145/2666141.2666144},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Saarinen14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SadeghiD14,
  author    = {Ahmad{-}Reza Sadeghi and
               Lucas Davi},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Beasty Memories: The Quest for Practical Defense against Code Reuse
               Attacks},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {23},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2668386},
  doi       = {10.1145/2666141.2668386},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/SadeghiD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Tsudik14,
  author    = {Gene Tsudik},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Challenges in Remote Attestation of Low-End Embedded Devices},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {1},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2668383},
  doi       = {10.1145/2666141.2668383},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Tsudik14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhaoZHQF14,
  author    = {Shijun Zhao and
               Qianying Zhang and
               Guangyao Hu and
               Yu Qin and
               Dengguo Feng},
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Providing Root of Trust for {ARM} TrustZone using On-Chip {SRAM}},
  booktitle = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  pages     = {25--36},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141.2666145},
  doi       = {10.1145/2666141.2666145},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/ZhaoZHQF14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014trusted,
  editor    = {Gail{-}Joon Ahn and
               Frederik Armknecht and
               Jorge Guajardo},
  title     = {Proceedings of the 4th International Workshop on Trustworthy Embedded
               Devices, TrustED '14, Scottsdale, Arizona, USA, November 3, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2666141},
  doi       = {10.1145/2666141},
  isbn      = {978-1-4503-3149-4},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2014trusted.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AliSOJ13,
  author    = {Syed Taha Ali and
               Vijay Sivaraman and
               Diethelm Ostry and
               Sanjay K. Jha},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Securing data provenance in body area networks using lightweight wireless
               link fingerprints},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {65--72},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517303},
  doi       = {10.1145/2517300.2517303},
  timestamp = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AliSOJ13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BergSL13,
  author    = {Robbert van den Berg and
               Boris Skoric and
               Vincent van der Leest},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Bias-based modeling and entropy analysis of PUFs},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {13--20},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517301},
  doi       = {10.1145/2517300.2517301},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BergSL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoitHN13,
  author    = {Christian Boit and
               Clemens Helfmeier and
               Dmitry Nedospasov},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Feasibly clonable functions},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {73--74},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2528523},
  doi       = {10.1145/2517300.2528523},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BoitHN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DamGN13,
  author    = {Mads Dam and
               Roberto Guanciale and
               Hamed Nemati},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Machine code verification of a tiny {ARM} hypervisor},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {3--12},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517302},
  doi       = {10.1145/2517300.2517302},
  timestamp = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/DamGN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/EllouzeAARB13,
  author    = {Nourhene Ellouze and
               Mohamed Allouche and
               Habib Ben Ahmed and
               Slim Rekhis and
               Noureddine Boudriga},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Securing implantable cardiac medical devices: use of radio frequency
               energy harvesting},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {35--42},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517307},
  doi       = {10.1145/2517300.2517307},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ccs/EllouzeAARB13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FanZAG13,
  author    = {Xinxin Fan and
               Nusa Zidaric and
               Mark D. Aagaard and
               Guang Gong},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Efficient hardware implementation of the stream cipher {WG-16} with
               composite field arithmetic},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {21--34},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517305},
  doi       = {10.1145/2517300.2517305},
  timestamp = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/FanZAG13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HerrewegeLSKV13,
  author    = {Anthony Van Herrewege and
               Vincent van der Leest and
               Andr{\'{e}} Schaller and
               Stefan Katzenbeisser and
               Ingrid Verbauwhede},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Secure {PRNG} seeding on commercial off-the-shelf microcontrollers},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {55--64},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517306},
  doi       = {10.1145/2517300.2517306},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/HerrewegeLSKV13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HillerWLBS13,
  author    = {Matthias Hiller and
               Michael Weiner and
               Leandro Rodrigues Lima and
               Maximilian Birkner and
               Georg Sigl},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Breaking through fixed {PUF} block limitations with differential sequence
               coding and convolutional codes},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {43--54},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2517304},
  doi       = {10.1145/2517300.2517304},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/HillerWLBS13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MerliP13,
  author    = {Dominik Merli and
               Rainer Plaga},
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {Physical unclonable functions: devices for cryptostorage},
  booktitle = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  pages     = {1--2},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517300.2528524},
  doi       = {10.1145/2517300.2528524},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/MerliP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013trusted,
  editor    = {Ahmad{-}Reza Sadeghi and
               Frederik Armknecht and
               Jean{-}Pierre Seifert},
  title     = {TrustED'13, Proceedings of the 2013 {ACM} Workshop on Trustworthy
               Embedded Devices, Co-located with {CCS} 2013, November 4, 2013, Berlin,
               Germany},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2517300},
  isbn      = {978-1-4503-2486-1},
  timestamp = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/2013trusted.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics