2025
Cage: Hardware-Accelerated Safe WebAssembly.
Proceedings of the 23rd ACM/IEEE International Symposium on Code Generation and Optimization, 2025
2024
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts.
IEEE Secur. Priv., 2024
Attestation with Constrained Relying Party.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Cherifying Linux: A Practical View on using CHERI.
Proceedings of the 17th European Workshop on Systems Security, 2024
MultiTEE: Distributing Trusted Execution Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
Platform Attestation in Consumer Devices.
Proceedings of the 33rd Conference of Open Innovations Association, 2023
2022
Toward Register Spilling Security Using LLVM and ARM Pointer Authentication.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022
Hardware Platform Security for Mobile Devices.
Found. Trends Priv. Secur., 2022
Color My World: Deterministic Tagging for Memory Safety.
CoRR, 2022
Trusted Hart for Mobile RISC-V Security.
Proceedings of the IEEE International Conference on Trust, 2022
Towards Interoperable Enclave Attestation: Learnings from Decades of Academic Work.
Proceedings of the 31st Conference of Open Innovations Association, 2022
Towards securely migrating webassembly enclaves.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022
2021
PACStack: an Authenticated Call Stack.
Proceedings of the 30th USENIX Security Symposium, 2021
Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021
2020
Camouflage: Hardware-assisted CFI for the ARM Linux kernel.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020
2019
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication.
Proceedings of the 28th USENIX Security Symposium, 2019
Protecting the stack with PACed canaries.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019
Authenticated Call Stack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019
2017
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Hardware Isolation for Trusted Execution.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
On Rehoming the Electronic ID to TEEs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Mobile Trusted Computing.
Proc. IEEE, 2014
The Untapped Potential of Trusted Execution Environments on Mobile Devices.
IEEE Secur. Priv., 2014
Citizen Electronic Identities using TPM 2.0.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
2013
Securing Software Architectures for Trusted Processor Environments ; Programvarusystem för säkra processorarkitekturer.
PhD thesis, 2013
Tapping and Tripping with NFC.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
Trusted execution environments on mobile devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Authenticated Encryption Primitives for Size-Constrained Trusted Computing.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
2011
Secure Device Pairing Based on a Visual Channel: Design and Usability Study.
IEEE Trans. Inf. Forensics Secur., 2011
Practical Property-Based Attestation on Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Mass Transit Ticketing with NFC Mobile Phones.
Proceedings of the Trusted Systems - Third International Conference, 2011
Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Identity verification schemes for public transport ticketing with NFC phones.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011
2010
Mobile Trusted Computing Based on MTM.
Int. J. Dependable Trust. Inf. Syst., 2010
Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010
Credential Disabling from Trusted Execution Environments.
Proceedings of the Information Security Technology for Applications, 2010
Can Hand-Held Computers Still Be Better Smart Cards?
Proceedings of the Trusted Systems - Second International Conference, 2010
Implementing an application-specific credential platform using late-launched mobile trusted module.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010
2009
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.
Proceedings of the Trusted Systems, First International Conference, 2009
On-board credentials with open provisioning.
Proceedings of the 2009 ACM Symposium on Information, 2009
Trust in a small package: minimized MRTM software implementation for mobile secure environments.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009
2008
Random Beacon for Privacy and Group Security.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
A Platform for OnBoard Credentials.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Scheduling execution of credentials in constrained secure environments.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008
Post-Payment System for Peer-to-Peer Filesharing.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Enabling Fairer Digital Rights Management with Trusted Computing.
Proceedings of the Information Security, 10th International Conference, 2007
2006
Secure Device Pairing based on a Visual Channel.
IACR Cryptol. ePrint Arch., 2006
Secure Device Pairing based on a Visual Channel (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006