no code implementations • 24 May 2019 • Hans Liljestrand, Thomas Nyman, Lachlan J. Gunn, Jan-Erik Ekberg, N. Asokan
Software shadow stacks incur high overheads or trade off security for efficiency.
Cryptography and Security
1 code implementation • 25 May 2016 • Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik
Remote attestation is a crucial security service particularly relevant to increasingly popular IoT (and other embedded) devices.
Cryptography and Security