Jan-Erik Ekberg

Orcid: 0009-0007-5432-6128

According to our database1, Jan-Erik Ekberg authored at least 50 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Viewpoint: Harmonizing the Diverse Memory Safety Fronts.
IEEE Secur. Priv., 2024

Cage: Hardware-Accelerated Safe WebAssembly.
CoRR, 2024

Attestation with Constrained Relying Party.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

Cherifying Linux: A Practical View on using CHERI.
Proceedings of the 17th European Workshop on Systems Security, 2024

MultiTEE: Distributing Trusted Execution Environments.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Platform Attestation in Consumer Devices.
Proceedings of the 33rd Conference of Open Innovations Association, 2023

2022
Toward Register Spilling Security Using LLVM and ARM Pointer Authentication.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Hardware Platform Security for Mobile Devices.
Found. Trends Priv. Secur., 2022

Color My World: Deterministic Tagging for Memory Safety.
CoRR, 2022

Trusted Hart for Mobile RISC-V Security.
Proceedings of the IEEE International Conference on Trust, 2022

Towards Interoperable Enclave Attestation: Learnings from Decades of Academic Work.
Proceedings of the 31st Conference of Open Innovations Association, 2022

Towards securely migrating webassembly enclaves.
Proceedings of the EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, 2022

2021
PACStack: an Authenticated Call Stack.
Proceedings of the 30th USENIX Security Symposium, 2021

Trusted Sockets Layer: A TLS 1.3 Based Trusted Channel Protocol.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

2020
Camouflage: Hardware-assisted CFI for the ARM Linux kernel.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

2019
PAC it up: Towards Pointer Integrity using ARM Pointer Authentication.
Proceedings of the 28th USENIX Security Symposium, 2019

Protecting the stack with PACed canaries.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

Authenticated Call Stack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2017
CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

The Circle Game: Scalable Private Membership Test Using Trusted Hardware.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Hardware Isolation for Trusted Execution.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
On Rehoming the Electronic ID to TEEs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Mobile Trusted Computing.
Proc. IEEE, 2014

The Untapped Potential of Trusted Execution Environments on Mobile Devices.
IEEE Secur. Priv., 2014

Citizen Electronic Identities using TPM 2.0.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

2013
Securing Software Architectures for Trusted Processor Environments ; Programvarusystem för säkra processorarkitekturer.
PhD thesis, 2013

Tapping and Tripping with NFC.
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013

Trusted execution environments on mobile devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Authenticated Encryption Primitives for Size-Constrained Trusted Computing.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

2011
Secure Device Pairing Based on a Visual Channel: Design and Usability Study.
IEEE Trans. Inf. Forensics Secur., 2011

Practical Property-Based Attestation on Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Mass Transit Ticketing with NFC Mobile Phones.
Proceedings of the Trusted Systems - Third International Conference, 2011

Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Identity verification schemes for public transport ticketing with NFC phones.
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

2010
Mobile Trusted Computing Based on MTM.
Int. J. Dependable Trust. Inf. Syst., 2010

Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Credential Disabling from Trusted Execution Environments.
Proceedings of the Information Security Technology for Applications, 2010

Can Hand-Held Computers Still Be Better Smart Cards?
Proceedings of the Trusted Systems - Second International Conference, 2010

Implementing an application-specific credential platform using late-launched mobile trusted module.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing.
Proceedings of the Trusted Systems, First International Conference, 2009

On-board credentials with open provisioning.
Proceedings of the 2009 ACM Symposium on Information, 2009

Trust in a small package: minimized MRTM software implementation for mobile secure environments.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

2008
Random Beacon for Privacy and Group Security.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

A Platform for OnBoard Credentials.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

Scheduling execution of credentials in constrained secure environments.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

Post-Payment System for Peer-to-Peer Filesharing.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Enabling Fairer Digital Rights Management with Trusted Computing.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Secure Device Pairing based on a Visual Channel.
IACR Cryptol. ePrint Arch., 2006

Secure Device Pairing based on a Visual Channel (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006


  Loading...