Seguir
Kari Kostiainen
Kari Kostiainen
Senior Scientist at ETH Zurich
E-mail confirmado em inf.ethz.ch - Página inicial
Título
Citado por
Citado por
Ano
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi
11th USENIX workshop on offensive technologies (WOOT 17), 2017
7712017
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017
2832017
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
Security and Privacy, 2006 IEEE Symposium on, 6 pp.-313, 2006
2732006
Design Choices for Central Bank Digital Currency: Policy and Technical Considerations
S Allen
Brookings Institution, 2020
2042020
Administration of wireless local area networks
N Asokan, P Ginzboorg, S Moloney, KT Kostiainen, S Sovio, JE Ekberg, ...
US Patent 8,532,304, 2013
1982013
On-board credentials with open provisioning
K Kostiainen, JE Ekberg, N Asokan, A Rantala
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1582009
The untapped potential of trusted execution environments on mobile devices
JE Ekberg, K Kostiainen, N Asokan
IEEE Security & Privacy 12 (4), 29-37, 2014
1462014
{BITE}: Bitcoin lightweight client privacy using trusted execution
S Matetic, K Wüst, M Schneider, K Kostiainen, G Karame, S Capkun
28th USENIX Security Symposium (USENIX Security 19), 783-800, 2019
1282019
Applicability of identity-based cryptography for disruption-tolerant networking
N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo
Proceedings of the 1st international MobiSys workshop on Mobile …, 2007
1212007
Trusted execution environments on mobile devices
JE Ekberg, K Kostiainen, N Asokan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1102013
Method and apparatus for authenticating a mobile device
JE Ekberg, K Kostiainen, P Laitinen, V Aarni, M Sainio, N Von Knorring, ...
US Patent 8,621,203, 2013
1092013
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
1052014
Phishing in organizations: Findings from a large-scale and long-term study
D Lain, K Kostiainen, S Čapkun
2022 IEEE Symposium on Security and Privacy (SP), 842-859, 2022
1042022
System for user-friendly access control setup using a protected setup
KTJ Kostiainen, SP Moloney, OA Rantapuska
US Patent 11,153,081, 2021
892021
DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization
F Brasser, S Capkun, A Dmitrienko, T Frassetto, K Kostiainen, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
872019
Mobile trusted computing
N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ...
Proceedings of the IEEE 102 (8), 1189-1206, 2014
852014
Method for remote message attestation in a communication system
KTJ Kostiainen, N Asokan
US Patent 7,913,086, 2011
812011
Towards securing disruption-tolerant networking
N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo
Nokia Research Center, Tech. Rep. NRC-TR-2007-007, 2007
702007
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
L Malisa, K Kostiainen, S Capkun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
692017
PRCash: Fast, Private and Regulated Transactions for Digital Currencies
K Wüst, K Kostiainen, V Čapkun, S Čapkun
Financial Cryptography and Data Security: 23rd International Conference, FC …, 2019
582019
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20