Name
Papers
Collaborators
N. ASOKAN
169
238
Citations 
PageRank 
Referers 
2889
211.44
4871
Referees 
References 
3459
1839
Search Limit
1001000
Title
Citations
PageRank
Year
Hardware Platform Security for Mobile Devices.00.342022
Real-Time Adversarial Perturbations Against Deep Reinforcement Learning Policies: Attacks and Defenses00.342022
Lux - Enabling Ephemeral Authorization for Display-Limited IoT Devices.00.342021
Tutorial: Investigating Advanced Exploits for System Security Assurance00.342021
Confronting the Limitations of Hardware-Assisted Security00.342020
Effective writing style transfer via combinatorial paraphrasing.00.342020
A little goes a long way: Improving toxic language classification despite data scarcity00.342020
Hardware-assisted Trusted Execution Environments - Look Back, Look Ahead.10.482019
DAWN: Dynamic Adversarial Watermarking of Neural Networks10.352019
Making Speculative BFT Resilient with Trusted Monotonic Counters00.342019
Effective writing style imitation via combinatorial paraphrasing.00.342019
Exploitation Techniques and Defenses for Data-Oriented Attacks.00.342019
Protecting the stack with PACed canaries30.412019
Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace?00.342019
Making targeted black-box evasion attacks effective and efficient.00.342019
Scalable Byzantine Consensus via Hardware-assisted Secret Sharing.130.612019
PACStack: an Authenticated Call Stack00.342019
PRADA: Protecting Against DNN Model Stealing Attacks100.482019
Sustainable Security & Safety - Challenges and Opportunities.00.342019
Authenticated Call Stack00.342019
Exploitation Techniques and Defenses for Data-Oriented Attacks00.342019
AuDI: Towards Autonomous IoT Device-Type Identification using Periodic Communication130.632019
Towards Fairness of Cryptocurrency Payments.00.342018
SoK: Modular and Efficient Private Decision Tree Evaluation00.342018
Get in Line: Ongoing Co-presence Verification of a Vehicle Formation Based on Driving Trajectories20.402018
Migrating SGX Enclaves with Persistent State00.342018
Proximity Verification Based on Acoustic Room Impulse Response.00.342018
On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World.00.342018
DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices.00.342018
OmniShare: Encrypted Cloud Storage for the Multi-Device Era.00.342018
Chowniot: Enhancing Iot Privacy By Automated Handling Of Ownership Change00.342018
Toward Linux kernel memory safety00.342018
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.80.772018
On The Use of Remote Attestation to Break and Repair Deniability.00.342018
Oblivious Neural Network Predictions via MiniONN transformations.311.152017
LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.50.412017
The Circle Game: Scalable Private Membership Test Using Trusted Hardware.110.552017
Protecting Web Passwords from Rogue Servers using Trusted Execution Environments.00.342017
Selint: An Seandroid Policy Analysis Tool10.362017
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.40.382017
Protecting Password Databases using Trusted Hardware.20.392016
On improving tie strength estimates by aggregating multiple communication channels00.342016
Exploring the use of Intel SGX for Secure Many-Party Applications.10.402016
Real-Time Client-Side Phishing Prevention Add-On10.352016
ABAKA: A novel attribute-based k-anonymous collaborative solution for LBSs.30.472016
Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks100.482016
POSTER: Friend or Foe? Context Authentication for Trust Domain Separation in IoT Environments.10.412016
Characterizing SEAndroid Policies in the Wild10.362015
SpotShare and nearbyPeople: applications of the Social PaL framework10.342015
On Making Emerging Trusted Execution Environments Accessible to Developers10.352015
  • 1
  • 2