Job Noorman

Orcid: 0000-0002-5287-2543

According to our database1, Job Noorman authored at least 19 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Architectural Mimicry: Innovative Instructions to Efficiently Address Control-Flow Leakage in Data-Oblivious Programs.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
End-to-End Security for Distributed Event-driven Enclave Applications on Heterogeneous TEEs.
ACM Trans. Priv. Secur., August, 2023

ProSpeCT: Provably Secure Speculation for the Constant-Time Policy (Extended version).
CoRR, 2023

ProSpeCT: Provably Secure Speculation for the Constant-Time Policy.
Proceedings of the 32nd USENIX Security Symposium, 2023

CHERI-TrEE: Flexible enclaves on capability machines.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2021
Securing Interruptible Enclaved Execution on Small Microprocessors.
ACM Trans. Program. Lang. Syst., 2021

POSTER: An Open-Source Framework for Developing Heterogeneous Distributed Enclave Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors: Extended Version.
CoRR, 2020

Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

2017
Sancus: A Low-Cost Security Architecture for Distributed IoT Applications on a Shared Infrastructure ; Sancus: Een goedkope beveiligingsarchitectuur voor gedistribueerde IoT toepassingen op een gedeelde infrastructuur.
PhD thesis, 2017

Sancus 2.0: A Low-Cost Security Architecture for IoT Devices.
ACM Trans. Priv. Secur., 2017

Authentic Execution of Distributed Event-Driven Applications with a Small TCB.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

FRP IoT modules as a Scala DSL.
Proceedings of the 4th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems, 2017

2016
Towards availability and real-time guarantees for protected module architectures.
Proceedings of the Companion Proceedings of the 15th International Conference on Modularity, Málaga, Spain, March 14, 2016

2015
Secure Resource Sharing for Embedded Protected Module Architectures.
Proceedings of the Information Security Theory and Practice, 2015

Lightweight and Flexible Trust Assessment Modules for the Internet of Things.
Proceedings of the Computer Security - ESORICS 2015, 2015

2013
Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Protected Software Module Architectures.
Proceedings of the ISSE 2013, 2013

2012
There Is Safety in Numbers: Preventing Control-Flow Hijacking by Duplication.
Proceedings of the Secure IT Systems - 17th Nordic Conference, 2012


  Loading...