Author:
Machiry Aravind,Gustafson Eric,Spensky Chad,Salls Christopher,Stephens Nick,Wang Ruoyu,Bianchi Antonio,Choe Yung Ryn,Kruegel Christopher,Vigna Giovanni
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Memory Corruption at the Border of Trusted Execution;IEEE Security & Privacy;2024-07
2. Automated Detection of Cryptographic Inconsistencies in Android’s Keymaster Implementations;Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services;2024-06-03
3. SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. Trusted Timing Services with Timeguard;2024 IEEE 30th Real-Time and Embedded Technology and Applications Symposium (RTAS);2024-05-13
5. MRA-IMA: Enhanced Mutual Remote Attestation Based on ARM TrustZone;2024 9th International Conference on Computer and Communication Systems (ICCCS);2024-04-19