Eduard Marin

Orcid: 0000-0002-5002-0187

Affiliations:
  • KU Leuven, Belgium


According to our database1, Eduard Marin authored at least 25 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security in Cloud-Native Services: A Survey.
J. Cybersecur. Priv., October, 2023

A Review of Deep Reinforcement Learning in Serverless Computing: Function Scheduling and Resource Auto-Scaling.
CoRR, 2023

HAT: Secure and Practical Key Establishment for Implantable Medical Devices.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
Serverless computing: a security perspective.
J. Cloud Comput., 2022

Privacy-preserving AI for future networks.
Commun. ACM, 2022

EqualNet: A Secure and Practical Defense for Long-term Network Topology Obfuscation.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Symbolon: Enabling Flexible Multi-device-based User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Heimdallr: Fingerprinting SD-WAN Control-Plane Architecture via Encrypted Control Traffic.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
PPFL: Enhancing Privacy in Federated Learning with Confidential Computing.
GetMobile Mob. Comput. Commun., 2021

FuzzyKey: Comparing Fuzzy Cryptographic Primitives on Resource-Constrained Devices.
IACR Cryptol. ePrint Arch., 2021

PPFL: privacy-preserving federated learning with trusted execution environments.
Proceedings of the MobiSys '21: The 19th Annual International Conference on Mobile Systems, Applications, and Services, Virtual Event, Wisconsin, USA, 24 June, 2021

Inter-operability and Orchestration in Heterogeneous Cloud/Edge Resources: The ACCORDION Vision.
Proceedings of the FRAME@HPDC 2021: Proceedings of the 1st Workshop on Flexible Resource and Application Management on the Edge, 2021

2019
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
De-pseudonymization of Smart Metering Data: Analysis and Countermeasures.
Proceedings of the 2018 Global Internet of Things Summit, 2018

Securing Wireless Neurostimulators.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

2017
Physical-layer fingerprinting of LoRa devices using supervised and zero-shot learning.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
A survey on physiological-signal-based security for medical devices.
IACR Cryptol. ePrint Arch., 2016

Towards Quantum Distance Bounding Protocols.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

On the Feasibility of Cryptography for a Wireless Insulin Pump System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

A Privacy-Preserving Remote Healthcare System Offering End-to-End Security.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 15th International Conference, 2016

On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016


  Loading...