Software grand exposure:{SGX} cache attacks are practical F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017 | 342 | 2017 |
Secure device pairing based on a visual channel N Saxena, JE Ekberg, K Kostiainen, N Asokan Security and Privacy, 2006 IEEE Symposium on, 6 pp.-313, 2006 | 254 | 2006 |
Administration of wireless local area networks N Asokan, P Ginzboorg, S Moloney, KT Kostiainen, S Sovio, JE Ekberg, ... US Patent 8,532,304, 2013 | 157 | 2013 |
On-board credentials with open provisioning K Kostiainen, JE Ekberg, N Asokan, A Rantala Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 134 | 2009 |
{ROTE}: Rollback protection for trusted execution S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ... 26th {USENIX} Security Symposium ({USENIX} Security 17), 1289-1306, 2017 | 123 | 2017 |
Applicability of identity-based cryptography for disruption-tolerant networking N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo Proceedings of the 1st international MobiSys workshop on Mobile …, 2007 | 108 | 2007 |
The untapped potential of trusted execution environments on mobile devices JE Ekberg, K Kostiainen, N Asokan IEEE Security & Privacy 12 (4), 29-37, 2014 | 88 | 2014 |
Method and apparatus for authenticating a mobile device JE Ekberg, K Kostiainen, P Laitinen, V Aarni, M Sainio, N Von Knorring, ... US Patent 8,621,203, 2013 | 81 | 2013 |
Smartphones as Practical and Secure Location Verification Tokens for Payments. C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun NDSS 14, 23-26, 2014 | 75 | 2014 |
Towards securing disruption-tolerant networking N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo Nokia Research Center, Tech. Rep. NRC-TR-2007-007, 2007 | 61 | 2007 |
Trusted execution environments on mobile devices JE Ekberg, K Kostiainen, N Asokan Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 60 | 2013 |
Method for remote message attestation in a communication system KTJ Kostiainen, N Asokan US Patent 7,913,086, 2011 | 57 | 2011 |
Mobile trusted computing N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ... Proceedings of the IEEE 102 (8), 1189-1206, 2014 | 54 | 2014 |
Old, new, borrowed, blue-- a perspective on the evolution of mobile platform security architectures K Kostiainen, E Reshetova, JE Ekberg, N Asokan Proceedings of the first ACM conference on Data and application security and …, 2011 | 54 | 2011 |
Security in Wireless Environments Using Out-Of-Band Channel Communication K Kostiainen, JE Ekberg, N Saxena US Patent App. 12/083,708, 2010 | 39 | 2010 |
DR. SGX: hardening SGX enclaves against cache attacks with data location randomization F Brasser, S Capkun, A Dmitrienko, T Frassetto, K Kostiainen, U Müller, ... arXiv preprint arXiv:1709.09917, 2017 | 37 | 2017 |
Credential transfer S Holtmanns, N Asokan, KTJ Kostiainen US Patent App. 13/513,662, 2012 | 37 | 2012 |
Detecting mobile application spoofing attacks by leveraging user visual similarity perception L Malisa, K Kostiainen, S Capkun Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 36 | 2017 |
Personalized security indicators to detect application phishing attacks in mobile platforms C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun arXiv preprint arXiv:1502.06824, 2015 | 35 | 2015 |
Secure device pairing based on a visual channel: Design and usability study N Saxena, JE Ekberg, K Kostiainen, N Asokan IEEE Transactions on Information Forensics and Security 6 (1), 28-38, 2011 | 35 | 2011 |