Thermal covert channels on multi-core platforms RJ Masti, D Rai, A Ranganathan, C Müller, L Thiele, S Capkun 24th USENIX security symposium (USENIX security 15), 865-880, 2015 | 207 | 2015 |
Enabling secure VM-vTPM migration in private clouds B Danev, RJ Masti, GO Karame, S Capkun Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 139 | 2011 |
Towards practical identification of HF RFID devices B Danev, S Capkun, R Jayaram Masti, TS Benjamin ACM transactions on Information and System Security (TISSEC) 15 (2), 1-24, 2012 | 47 | 2012 |
Personalized security indicators to detect application phishing attacks in mobile platforms C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun arXiv preprint arXiv:1502.06824, 2015 | 44 | 2015 |
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 40 | 2016 |
Sok: Hardware-supported trusted execution environments M Schneider, RJ Masti, S Shinde, S Capkun, R Perez arXiv preprint arXiv:2205.12742, 2022 | 38 | 2022 |
Cryptographic computing using encrypted base addresses and used in multi-tenant environments DM Durham, M LeMay, RJ MASTI, G Neiger, JW Brandt US Patent 11,403,234, 2022 | 37 | 2022 |
Cryptographic computing using encrypted base addresses and used in multi-tenant environments DM Durham, M LeMay, RJ MASTI, G Neiger, JW Brandt US Patent 11,416,624, 2022 | 35 | 2022 |
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 27 | 2016 |
An architecture for concurrent execution of secure environments in clouds R Jayaram Masti, C Marforio, S Capkun Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22, 2013 | 26 | 2013 |
Enabling Trusted Scheduling in Embedded Systems RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun Annual Computer Security Applications Conference, 61-70, 2012 | 22 | 2012 |
Formal verification of security critical hardware-firmware interactions in commercial SoCs S Ray, N Ghosh, RJ Masti, A Kanuparthi, JM Fung Proceedings of the 56th Annual Design Automation Conference 2019, 1-4, 2019 | 17 | 2019 |
Cryptographic computing using encrypted base addresses and used in multi-tenant environments DM Durham, M LeMay, RJ MASTI, G Neiger, JW Brandt US Patent App. 17/878,322, 2022 | 12 | 2022 |
SALVE: server authentication with location verification DY Yu, A Ranganathan, RJ Masti, C Soriente, S Capkun Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016 | 10 | 2016 |
Isolated execution on many-core architectures RJ Masti, D Rai, C Marforio, S Capkun Cryptology ePrint Archive, 2014 | 10 | 2014 |
Method and apparatus for multi-key total memory encryption based on dynamic key derivation HM Khosravi, S Chhabra, V Von Bokern, BE Huntley, V Shanbhogue, ... US Patent App. 16/728,712, 2021 | 7 | 2021 |
On the security of virtual machine migration and related topics R Jayaram Masti Eidgenössische Technische Hochschule Zürich, Department of Computer Sciences, 2010 | 7 | 2010 |
Split-control of page attributes between virtual machines and a virtual machine monitor G Neiger, G Strongin, RJ MASTI US Patent 10,768,968, 2020 | 4 | 2020 |
Logical partitions on many-core platforms RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 3 | 2015 |
Enabling Isolation on Modern Computing Platforms RJ Masti ETH Zurich, 2015 | 2 | 2015 |