Ramya Jayaram Masti

According to our database1, Ramya Jayaram Masti authored at least 16 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
SoK: Hardware-supported Trusted Execution Environments.
CoRR, 2022

2019
Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2016
SALVE: server authentication with location verification.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Enabling Isolation on Modern Computing Platforms.
PhD thesis, 2015

W-SPS: Designing a Wide-Area Secure Positioning System.
IACR Cryptol. ePrint Arch., 2015

Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015

Thermal Covert Channels on Multi-core Platforms.
Proceedings of the 24th USENIX Security Symposium, 2015

Logical Partitions on Many-Core Platforms.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Isolated Execution on Many-core Architectures.
IACR Cryptol. ePrint Arch., 2014

2013
An architecture for concurrent execution of secure environments in clouds.
Proceedings of the CCSW'13, 2013

2012
Towards Practical Identification of HF RFID Devices.
ACM Trans. Inf. Syst. Secur., 2012

Enabling trusted scheduling in embedded systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Holmes: A data theft forensic framework.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011

Enabling secure VM-vTPM migration in private clouds.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011


  Loading...