About
Contact & Profiles
Research Areas
- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Distributed systems and fault tolerance
- Real-Time Systems Scheduling
- Digital and Cyber Forensics
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- Embedded Systems Design Techniques
10.1561/3300000024
article
EN
Foundations and Trends® in Privacy and Security
2022-01-01
10.1145/3634737.3637675
article
EN
2024-06-28
The majority of mobile devices today are based on Arm architecture that supports the hosting trusted applications in Trusted Execution Environment (TEE). RISC-V is a relatively new open-source instruction set was engineered to fit many uses. In one potential usage scenario, could be hardware. We consider implications porting security stack top system chip, identify gaps Keystone framework for building custom TEEs, and propose that, among other things, GlobalPlatform TEE API specification...
10.48550/arxiv.2211.10299
preprint
EN
other-oa
arXiv (Cornell University)
2022-01-01
Coming Soon ...