Code randomization is an effective defense against code reuse attacks. It scrambles program code to prevent attackers from locating useful functions or gadgets. The key to secure...
In recent years, simple password-based authentication systems have increasingly proven ineffective for many classes of real-world devices. As a result, many researchers have conc...
In international military coalitions, situation awareness is achieved by gathering critical intel from different authorities. Authorities want to retain control over their data, a...
Alexandru Ionut Egner, Duc Luu, Jerry den Hartog, ...
Many mobile services consist of two components: a server providing an API, and an application running on smartphones and communicating with the API. An unresolved problem in this ...
The poster illustrates the idea of integrating digital social media with sensor networks (SoSeMe). In order to achieve tangible, specific results, we concentrate on the scenario o...
—As system security demands continue to evolve, Physically Unclonable Functions (PUFs) are a promising solution for secure storage on Integrated Circuits (ICs). SRAM PUFs are amo...
Clemens Helfmeier, Christian Boit, Dmitry Nedospas...
SPDZ (pronounced “Speedz”) is the nickname of the MPC protocol of Damg˚ard et al. from Crypto 2012. SPDZ provided various efficiency innovations on both the theoretical and p...
Abstract—The security literature offers a multitude of calculi, languages, and systems for information-flow control, each with some set of labels encoding security policies that...