Seguir
Kari Kostiainen
Kari Kostiainen
Senior Scientist at ETH Zurich
Dirección de correo verificada de inf.ethz.ch - Página principal
Título
Citado por
Citado por
Año
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi
11th USENIX workshop on offensive technologies (WOOT 17), 2017
7742017
{ROTE}: Rollback protection for trusted execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th USENIX Security Symposium (USENIX Security 17), 1289-1306, 2017
2842017
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
Security and Privacy, 2006 IEEE Symposium on, 6 pp.-313, 2006
2722006
Design choices for central bank digital currency: Policy and technical considerations
S Allen, S Čapkun, I Eyal, G Fanti, BA Ford, J Grimmelmann, A Juels, ...
National Bureau of Economic Research, 2020
2052020
Administration of wireless local area networks
N Asokan, P Ginzboorg, S Moloney, KT Kostiainen, S Sovio, JE Ekberg, ...
US Patent 8,532,304, 2013
1962013
On-board credentials with open provisioning
K Kostiainen, JE Ekberg, N Asokan, A Rantala
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1582009
The untapped potential of trusted execution environments on mobile devices
JE Ekberg, K Kostiainen, N Asokan
IEEE Security & Privacy 12 (4), 29-37, 2014
1462014
{BITE}: Bitcoin lightweight client privacy using trusted execution
S Matetic, K Wüst, M Schneider, K Kostiainen, G Karame, S Capkun
28th USENIX Security Symposium (USENIX Security 19), 783-800, 2019
1282019
Applicability of identity-based cryptography for disruption-tolerant networking
N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo
Proceedings of the 1st international MobiSys workshop on Mobile …, 2007
1212007
Trusted execution environments on mobile devices
JE Ekberg, K Kostiainen, N Asokan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1102013
Phishing in organizations: Findings from a large-scale and long-term study
D Lain, K Kostiainen, S Čapkun
2022 IEEE Symposium on Security and Privacy (SP), 842-859, 2022
1062022
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
1052014
Method and apparatus for authenticating a mobile device
JE Ekberg, K Kostiainen, P Laitinen, V Aarni, M Sainio, N Von Knorring, ...
US Patent 8,621,203, 2013
1052013
DR. SGX: Automated and adjustable side-channel protection for SGX using data location randomization
F Brasser, S Capkun, A Dmitrienko, T Frassetto, K Kostiainen, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
882019
Mobile trusted computing
N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ...
Proceedings of the IEEE 102 (8), 1189-1206, 2014
852014
System for user-friendly access control setup using a protected setup
KTJ Kostiainen, SP Moloney, OA Rantapuska
US Patent 11,153,081, 2021
822021
Method for remote message attestation in a communication system
KTJ Kostiainen, N Asokan
US Patent 7,913,086, 2011
782011
Towards securing disruption-tolerant networking
N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo
Nokia Research Center, Tech. Rep. NRC-TR-2007-007, 2007
702007
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
L Malisa, K Kostiainen, S Capkun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
692017
ACE: Asynchronous and concurrent execution of complex smart contracts
K Wüst, S Matetic, S Egli, K Kostiainen, S Capkun
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
582020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20