Author image not provided
 Job Noorman
 jobatnoorman.info

  Affiliation history
Bibliometrics: publication history
Average citations per article4.57
Citation Count32
Publication count7
Publication years2012-2017
Available for download3
Average downloads per article89.00
Downloads (cumulative)267
Downloads (12 Months)243
Downloads (6 Weeks)41
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author




BOOKMARK & SHARE


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1 published by ACM
October 2017 REBLS 2017: Proceedings of the 4th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 7,   Downloads (Overall): 7

Full text available: PDFPDF
With Internet of Things applications growing in size and popularity, physical sensor networks are more often running multiple complex applications. It becomes increasingly important to maintain these event-driven programs on embedded systems. Traditionally, event-driven applications such as sensor network applications are written using an imperative style of programming where different ...
Keywords: Functional Reactive Programming, DSL, Scala

2 published by ACM
July 2017 ACM Transactions on Privacy and Security (TOPS): Volume 20 Issue 3, August 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 28,   Downloads (12 Months): 205,   Downloads (Overall): 205

Full text available: PDFPDF
The Sancus security architecture for networked embedded devices was proposed in 2013 at the USENIX Security conference. It supports remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised and ...
Keywords: Software security engineering, Trusted computing, Embedded systems security, Protected Module Architectures

3 published by ACM
March 2016 MODULARITY Companion 2016: Companion Proceedings of the 15th International Conference on Modularity
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 19,   Downloads (Overall): 31

Full text available: PDFPDF
Protected Module Architectures are a new brand of security architectures whose main objective is to support the secure isolated execution of software modules with a minimal Trusted Computing Base (TCB) -- several prototypes for embedded systems (and also the Intel Software Guard eXtensions for higher-end systems) ensure isolation with a ...
Keywords: Protected module architecture, real-time operating system, secure interrupt, secure scheduling, trusted computing, mixed-criticality

4
September 2015 Proceedings, Part I, of the 20th European Symposium on Computer Security -- ESORICS 2015 - Volume 9326
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

In this paper we describe a novel approach to securely obtain measurements with respect to the integrity of software running on a low-cost and low-power computing node autonomously or on request. We propose to use these measurements as an indication of the trustworthiness of that node. Our approach is based ...
Keywords: Internet of Things, Trust assessment, Protected software modules, Trust management, Wireless sensor networks

5
August 2015 Proceedings of the 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice - Volume 9311
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Low-end embedded devices and the Internet of Things IoT are becoming increasingly important for our lives. They are being used in domains such as infrastructure management, and medical and healthcare systems, where business interests and our security and privacy are at stake. Yet, security mechanisms have been appallingly neglected on ...
Keywords: Access control, Internet of things, Protected module architecture, Trusted computing, Resource sharing, Embedded file system

6
August 2013 SEC'13: Proceedings of the 22nd USENIX conference on Security
Publisher: USENIX Association
Bibliometrics:
Citation Count: 25

In this paper we propose Sancus, a security architecture for networked embedded devices. Sancus supports extensibility in the form of remote (even third-party) software installation on devices while maintaining strong security guarantees. More specifically, Sancus can remotely attest to a software provider that a specific software module is running uncompromised, ...

7
October 2012 NordSec'12: Proceedings of the 17th Nordic conference on Secure IT Systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Despite the large number of proposed countermeasures against control-flow hijacking attacks, these attacks still pose a great threat for today's applications. The problem with existing solutions is that they either provide incomplete probabilistic protection (e.g., stack canaries) or impose a high runtime overhead (e.g., bounds checking). In this paper, we ...
Keywords: control-data attacks, return addresses, duplication, function pointers



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us