Enabling secure VM-vTPM migration in private clouds B Danev, RJ Masti, GO Karame, S Capkun Proceedings of the 27th Annual Computer Security Applications Conference …, 2011 | 120 | 2011 |
Thermal covert channels on multi-core platforms RJ Masti, D Rai, A Ranganathan, C Müller, L Thiele, S Capkun 24th {USENIX} Security Symposium ({USENIX} Security 15), 865-880, 2015 | 101 | 2015 |
Personalized security indicators to detect application phishing attacks in mobile platforms C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun arXiv preprint arXiv:1502.06824, 2015 | 36 | 2015 |
Towards practical identification of HF RFID devices B Danev, S Capkun, R Jayaram Masti, TS Benjamin ACM transactions on Information and System Security (TISSEC) 15 (2), 1-24, 2012 | 29 | 2012 |
An architecture for concurrent execution of secure environments in clouds R Jayaram Masti, C Marforio, S Capkun Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 11-22, 2013 | 20 | 2013 |
Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications C Marforio, R Jayaram Masti, C Soriente, K Kostiainen, S Čapkun Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems …, 2016 | 17 | 2016 |
Hardened setup of personalized security indicators to counter phishing attacks in mobile banking C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 13 | 2016 |
Enabling Trusted Scheduling in Embedded Systems RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun Annual Computer Security Applications Conference, 61-70, 2012 | 11 | 2012 |
Isolated Execution on Many-core Architectures. RJ Masti, D Rai, C Marforio, S Capkun IACR Cryptol. ePrint Arch. 2014, 136, 2014 | 10 | 2014 |
SALVE: server authentication with location verification DY Yu, A Ranganathan, RJ Masti, C Soriente, S Capkun Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016 | 9 | 2016 |
On the security of virtual machine migration and related topics R Jayaram Masti Eidgenössische Technische Hochschule Zürich, Department of Computer Sciences, 2010 | 7 | 2010 |
Logical partitions on many-core platforms RJ Masti, C Marforio, K Kostiainen, C Soriente, S Capkun Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 3 | 2015 |
Formal Verification of Security Critical Hardware-Firmware Interactions in Commercial SoCs S Ray, N Ghosh, RJ Masti, A Kanuparthi, JM Fung 2019 56th ACM/IEEE Design Automation Conference (DAC), 1-4, 2019 | 2 | 2019 |
Communication apparatus, system, method, and non-transitory medium T Sasaki, A Perrig, S Capkun, C Soriente, RJ Masti, J Lee US Patent 10,649,847, 2020 | 1 | 2020 |
W-SPS: Designing a Wide-Area Secure Positioning System. DY Yu, A Ranganathan, RJ Masti, C Soriente, S Capkun IACR Cryptol. ePrint Arch. 2015, 230, 2015 | 1 | 2015 |
Holmes: A data theft forensic framework RJ Masti, V Lenders, M Strasser, S Engel, B Plattner 2011 IEEE International Workshop on Information Forensics and Security, 1-6, 2011 | 1 | 2011 |
A Security Forensics framework RJ Masti, V Lenders, S Engel, M Strasser, B Plattner, S Capkun ETH Zurich, 2010 | 1 | 2010 |
Split-control of page attributes between virtual machines and a virtual machine monitor G Neiger, G Strongin, RJ MASTI US Patent 10,768,968, 2020 | | 2020 |
Cryptographic computing using encrypted base addresses and used in multi-tenant environments DM Durham, M Lemay, RJ MASTI, G Neiger, JW Brandt US Patent App. 16/740,359, 2020 | | 2020 |
Cryptographic computing using encrypted base addresses and used in multi-tenant environments DM Durham, M Lemay, RJ MASTI, G Neiger, JW Brandt US Patent App. 16/722,707, 2020 | | 2020 |