Ivan Oliveira Nunes

Orcid: 0000-0003-3486-6550

Affiliations:
  • Rochester Institute of Technology, USA


According to our database1, Ivan Oliveira Nunes authored at least 46 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices.
IEEE Commun. Mag., July, 2024

TRACES: TEE-based Runtime Auditing for Commodity Embedded Systems.
CoRR, 2024

SpecCFA: Enhancing Control Flow Attestation/Auditing via Application-Aware Sub-Path Speculation.
CoRR, 2024

SoK: Runtime Integrity.
CoRR, 2024

Towards Browser Controls to Protect Cookies from Malicious Extensions.
CoRR, 2024

Poisoning Prevention in Federated Learning and Differential Privacy via Stateful Proofs of Execution.
CoRR, 2024

Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices.
CoRR, 2024

2023
UCCA: A Verified Architecture for Compartmentalization of Untrusted Code Sections in Resource-Constrained Devices.
CoRR, 2023

DiCA: A Hardware-Software Co-Design for Differential Checkpointing in Intermittently Powered Devices.
CoRR, 2023

PARseL: Towards a Verified Root-of-Trust over seL4.
CoRR, 2023

ACFA: Secure Runtime Auditing & Guaranteed Device Healing via Active Control Flow Attestation.
Proceedings of the 32nd USENIX Security Symposium, 2023

ISC-FLAT: On the Conflict Between Control Flow Attestation and Real-Time Operations.
Proceedings of the 29th IEEE Real-Time and Embedded Technology and Applications Symposium, 2023

$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust Over seL4.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

$\mathcal{D}\mathsf{iCA}$: A Hardware-Software Co-Design for Differential Check-Pointing in Intermittently Powered Devices.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

2022
Oblivious Extractors and Improved Security in Biometric-based Authentication Systems.
IACR Cryptol. ePrint Arch., 2022

GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices).
Proceedings of the 31st USENIX Security Symposium, 2022

Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

CASU: Compromise Avoidance via Secure Update for Low-End Embedded Systems.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

ASAP: reconciling asynchronous real-time operations and proofs of execution in simple embedded systems.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
Verifiable Integrity and Availability for Code and Execution in Simple Embedded Systems.
PhD thesis, 2021

GAROTA: Generalized Active Root-Of-Trust Architecture.
CoRR, 2021

Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

On the Root of Trust Identification Problem.
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021

Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

DIALED: Data Integrity Attestation for Low-end Embedded Devices.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

On the TOCTOU Problem in Remote Attestation.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution.
CoRR, 2020

APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems.
Future Gener. Comput. Syst., 2019

A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019

VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards Systematic Design of Collective Remote Attestation Protocols.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019

2018
Formally Verified Hardware/Software Co-Design for Remote Attestation.
CoRR, 2018

KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks.
CoRR, 2018

Combining Spatial and Social Awareness in D2D Opportunistic Routing.
IEEE Commun. Mag., 2018

Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
GROUPS-NET: Group meetings aware routing in multi-hop D2D networks.
Comput. Networks, 2017

ST-Drop: Uma Nova Estratégia de Gerenciamento de Buffer em Redes Oportunistas D2D.
Proceedings of the XXXV Brazilian Symposium on Computer Networks and Distributed Systems, 2017

GRM: Group Regularity Mobility Model.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Namespace Tunnels in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

ST-Drop: A novel buffer management strategy for D2D opportunistic networks.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

2016
Leveraging D2D multihop communication through social group meeting awareness.
IEEE Wirel. Commun., 2016

AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle.
Proceedings of the 14th ACM Conference on Embedded Network Sensor Systems, SenSys 2016, 2016

Group mobility: Detection, tracking and characterization.
Proceedings of the 2016 IEEE International Conference on Communications, 2016


  Loading...