Thomas Nyman

Orcid: 0000-0001-7647-6230

According to our database1, Thomas Nyman authored at least 25 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Friend or Foe Inside? Exploring In-Process Isolation to Maintain Memory Safety for Unsafe Rust.
Proceedings of the IEEE Secure Development Conference, 2023

Exploring the Environmental Benefits of In-Process Isolation for Software Resilience.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Rewind & Discard: Improving Software Resilience using Isolated Domains.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Hardware Platform Security for Mobile Devices.
Found. Trends Priv. Secur., 2022

Unlimited Lives: Secure In-Process Rollback with Isolated Domains.
CoRR, 2022

2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021

PACStack: an Authenticated Call Stack.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Toward Hardware-assisted Run-time Protection.
PhD thesis, 2020

2019
Exploitation Techniques and Defenses for Data-Oriented Attacks.
CoRR, 2019

PAC it up: Towards Pointer Integrity using ARM Pointer Authentication.
Proceedings of the 28th USENIX Security Symposium, 2019

Protecting the stack with PACed canaries.
Proceedings of the 4th Workshop on System Software for Trusted Execution, 2019

Exploitation Techniques and Defenses for Data-Oriented Attacks.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

HardScope: Hardening Embedded Systems Against Data-Oriented Attacks.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

Authenticated Call Stack.
Proceedings of the 56th Annual Design Automation Conference 2019, 2019

2018
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

2017
HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.
CoRR, 2017

CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware.
Proceedings of the 54th Annual Design Automation Conference, 2017

2016
Characterizing SEAndroid Policies in the Wild.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Open-TEE - An Open Virtual Trusted Execution Environment.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

On Making Emerging Trusted Execution Environments Accessible to Developers.
Proceedings of the Trust and Trustworthy Computing - 8th International Conference, 2015

2014
Security of OS-level virtualization technologies: Technical report.
CoRR, 2014

Security of OS-Level Virtualization Technologies.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Citizen Electronic Identities using TPM 2.0.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014


  Loading...