InfoSec2015 Summer School material
This page has slides of my talks at the
International Summer School on Information Security, 2015
.
Lectures 1 and 2
Slides
Further reading:
TPM 2.0 Extended Authorization model is explained in Section 2.3 and Appendix B of
Citizen Electronic Identities using TPM 2.0
. ACM CCS TrustED workshop (2014) (
extended research report at arXiv
).
Mobile Trusted Computing
. Proceedings of the IEEE 102(8): 1189-1206 (2014)
The Untapped Potential of Trusted Execution Environments on Mobile Devices
. IEEE Security & Privacy Magazine 12(4):29-37 (2014)
Security associations for wireless devices
, Book chapter.
Opportunistic Human Observation Attacks: Perils in Designing Zero-EffortDeauthentication
, CoRR abs/1505.05779 (2015)
Lecture 3
Slides
Last modified: Sat, Jul 4, 2015 3:49:49 PM