Abstract is missing.
- PUF-Based Software Protection for Low-End Embedded DevicesFlorian Kohnhäuser, André Schaller, Stefan Katzenbeisser 0001. 3-21 [doi]
- Why Attackers Win: On the Learnability of XOR Arbiter PUFsFatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert. 22-39 [doi]
- A Unified Security Analysis of Two-Phase Key Exchange Protocols in TPM 2.0Shijun Zhao, Qianying Zhang. 40-57 [doi]
- On Making Emerging Trusted Execution Environments Accessible to DevelopersThomas Nyman, Brian McGillion, N. Asokan. 58-67 [doi]
- Computing Trust Levels Based on User's Personality and Observed System TrustworthinessMichalis Kanakakis, Shenja van der Graaf, Costas Kalogiros, Wim Vanobberghen. 71-87 [doi]
- Enhancing the Trustworthiness of Service On-Demand Systems via Smart Vote FilteringChristos V. Samaras, Ageliki Tsioliaridou, Christos Liaskos, Dimitris Spiliotopoulos, Sotiris Ioannidis. 88-103 [doi]
- Design and Field Evaluation of PassSec: Raising and Sustaining Web Surfer Risk AwarenessMelanie Volkamer, Karen Renaud, Gamze Canova, Benjamin Reinheimer, Kristoffer Braun. 104-122 [doi]
- Trustworthy Memory Isolation of Linux on Embedded DevicesHamed Nemati, Mads Dam, Roberto Guanciale, Viktor Do, Arash Vahidi. 125-142 [doi]
- LookAhead: Augmenting Crowdsourced Website Reputation Systems with Predictive ModelingSourav Bhattacharya, Otto Huhta, N. Asokan. 143-162 [doi]
- Ripple: Overview and OutlookFrederik Armknecht, Ghassan O. Karame, Avikarsha Mandal, Franck Youssef, Erik Zenner. 163-180 [doi]
- Time to Rethink: Trust Brokerage Using Trusted Execution EnvironmentsPatrick Koeberl, Vinay Phegade, Anand Rajan, Thomas Schneider, Steffen Schulz 0001, Maria Zhdanova. 181-190 [doi]
- REWIRE - Revocation Without Resolution: A Privacy-Friendly Revocation Mechanism for Vehicular Ad-Hoc NetworksDavid Förster, Hans Löhr, Jan Zibuschka, Frank Kargl. 193-208 [doi]
- DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZoneBo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng. 209-227 [doi]
- DAA-A: Direct Anonymous Attestation with AttributesLiqun Chen, Rainer Urian. 228-245 [doi]
- Proposed Processor Extensions for Significant Speedup of Hypervisor Memory IntrospectionAndrei Lutas, Sándor Lukács, Adrian Colesa, Dan Lutas. 249-267 [doi]
- MWA Skew SRAM Based SIMPL Systems for Public-Key Physical CryptographyQingqing Chen, Ulrich Rührmair, Spoorthy Narayana, Uzair Sharif, Ulf Schlichtmann. 268-282 [doi]
- Secure Erasure and Code Update in Legacy SensorsGhassan O. Karame, Wenting Li. 283-299 [doi]
- Efficient Provisioning of a Trustworthy Environment for Security-Sensitive ApplicationsAdrian Colesa, Sándor Lukács, Vlad Topan, Radu Ciocas, Adrian Pop. 300-309 [doi]