Kari Kostiainen

Orcid: 0000-0002-9092-8683

According to our database1, Kari Kostiainen authored at least 55 papers between 2005 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Composite Enclaves: Towards Disaggregated Trusted Execution.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Censorship-Resilient and Confidential Collateralized Second-Layer Payments.
IACR Cryptol. ePrint Arch., 2022

Phishing in Organizations: Findings from a Large-Scale and Long-Term Study.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy-Preserving Regulation.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Platypus: A Central Bank Digital Currency with Unlinkable Transactions and Privacy Preserving Regulation.
IACR Cryptol. ePrint Arch., 2021

Bitcontracts: Supporting Smart Contracts in Legacy Blockchains.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
Dedicated Security Chips in the Age of Secure Enclaves.
IEEE Secur. Priv., 2020

2FE: Two-Factor Encryption for Cloud Storage.
CoRR, 2020

PIE: A Dynamic TCB for Remote Systems with a Platform Isolation Environment.
CoRR, 2020

Snappy: Fast On-chain Payments with Practical Collaterals.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

ProximiTEE: Hardened SGX Attestation by Proximity Verification.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts.
IACR Cryptol. ePrint Arch., 2019

Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

ProtectIOn: Root-of-Trust for IO in Compromised Platforms.
IACR Cryptol. ePrint Arch., 2019

PRCash: Fast, Private and Regulated Transactions for Digital Currencies.
Proceedings of the Financial Cryptography and Data Security, 2019

DR.SGX: automated and adjustable side-channel protection for SGX using data location randomization.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
PRCash: Centrally-Issued Digital Currency with Privacy and Regulation.
IACR Cryptol. ePrint Arch., 2018

ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution.
IACR Cryptol. ePrint Arch., 2018

BITE: Bitcoin Lightweight Client Privacy using Trusted Execution.
IACR Cryptol. ePrint Arch., 2018

ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification.
IACR Cryptol. ePrint Arch., 2018

Identity Aging: Efficient Blockchain Consensus.
CoRR, 2018

2017
ROTE: Rollback Protection for Trusted Execution.
IACR Cryptol. ePrint Arch., 2017

Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks.
IACR Cryptol. ePrint Arch., 2017

IntegriKey: End-to-End Integrity Protection of User Input.
IACR Cryptol. ePrint Arch., 2017

DR.SGX: Hardening SGX Enclaves against Cache Attacks with Data Location Randomization.
CoRR, 2017

Software Grand Exposure: SGX Cache Attacks Are Practical.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
Hacking in the Blind: (Almost) Invisible Runtime UI Attacks on Safety-Critical Terminals.
CoRR, 2016

Mobile Application Impersonation Detection Using Dynamic User Interface Extraction.
Proceedings of the Computer Security - ESORICS 2016, 2016

Evaluation of Personalized Security Indicators as an Anti-Phishing Mechanism for Smartphone Applications.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Hardened Setup of Personalized Security Indicators to Counter Phishing Attacks in Mobile Banking.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception.
IACR Cryptol. ePrint Arch., 2015

Personalized Security Indicators to Detect Application Phishing Attacks in Mobile Platforms.
CoRR, 2015

Logical Partitions on Many-Core Platforms.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Mobile Trusted Computing.
Proc. IEEE, 2014

The Untapped Potential of Trusted Execution Environments on Mobile Devices.
IEEE Secur. Priv., 2014

Smartphones as Practical and Secure Location Verification Tokens for Payments.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Mobile Platform Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02341-5, 2013

Secure enrollment and practical migration for mobile trusted execution environments.
Proceedings of the SPSM'13, 2013

Trusted execution environments on mobile devices.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Secure Device Pairing Based on a Visual Channel: Design and Usability Study.
IEEE Trans. Inf. Forensics Secur., 2011

Practical Property-Based Attestation on Mobile Devices.
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Credential life cycle management in open credential platforms (short paper).
Proceedings of the sixth ACM workshop on Scalable trusted computing, 2011

Towards User-Friendly Credential Transfer on Open Credential Platforms.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Controlling resource hogs in mobile delay-tolerant networks.
Comput. Commun., 2010

Key Attestation from Trusted Execution Environments.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

Credential Disabling from Trusted Execution Environments.
Proceedings of the Information Security Technology for Applications, 2010

TruWalletM: Secure Web Authentication on Mobile Platforms.
Proceedings of the Trusted Systems - Second International Conference, 2010

2009
On-board credentials with open provisioning.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Scheduling execution of credentials in constrained secure environments.
Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, 2008

2007
Usable Access Control inside Home Networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Applicability of identity-based cryptography for disruption-tolerant networking.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

2006
Secure Device Pairing based on a Visual Channel.
IACR Cryptol. ePrint Arch., 2006

Secure Device Pairing based on a Visual Channel (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

2005
Visitor Access Management in Personal Wireless Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005


  Loading...