Skip to main content

Showing 1–4 of 4 results for author: Masti, R J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.12742  [pdf, other

    cs.CR cs.AR

    SoK: Hardware-supported Trusted Execution Environments

    Authors: Moritz Schneider, Ramya Jayaram Masti, Shweta Shinde, Srdjan Capkun, Ronald Perez

    Abstract: The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast. More generally, existing TEEs have not been subject to a holistic… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

  2. SALVE: Server Authentication with Location VErification

    Authors: Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun

    Abstract: The Location Service (LCS) proposed by the telecommunication industry is an architecture that allows the location of mobile devices to be accessed in various applications. We explore the use of LCS in location-enhanced server authentication, which traditionally relies on certificates. Given recent incidents involving certificate authorities, various techniques to strengthen server authentication w… ▽ More

    Submitted 16 August, 2016; originally announced August 2016.

    Comments: 14 pages. This paper will be presented at the 22nd ACM International Conference on Mobile Computing and Networking (MobiCom 2016). Related paper: https://eprint.iacr.org/2015/230

  3. arXiv:1503.07000  [pdf, other

    cs.CR

    Thermal Covert Channels on Multi-core Platforms

    Authors: Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun

    Abstract: Side channels remain a challenge to information flow control and security in modern computing platforms. Resource partitioning techniques that minimise the number of shared resources among processes are often used to address this challenge. In this work, we focus on multi-core platforms and we demonstrate that even seemingly strong isolation techniques based on dedicated cores and memory can be ci… ▽ More

    Submitted 24 March, 2015; originally announced March 2015.

    Comments: 15 pages, 9 figures

  4. arXiv:1502.06824  [pdf, other

    cs.CR

    Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms

    Authors: Claudio Marforio, Ramya Jayaram Masti, Claudio Soriente, Kari Kostiainen, Srdjan Capkun

    Abstract: Phishing in mobile applications is a relevant threat with successful attacks reported in the wild. In such attacks, malicious mobile applications masquerade as legitimate ones to steal user credentials. In this paper we categorize application phishing attacks in mobile platforms and possible countermeasures. We show that personalized security indicators can help users to detect phishing attacks an… ▽ More

    Submitted 24 February, 2015; originally announced February 2015.