Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

3 results
Image document

How TrustZone Could Be Bypassed: Side-Channel Attacks on a Modern System-on-Chip

Sebanjila Kevin Bukasa , Ronan Lashermes , Hélène Le Bouder , Jean-Louis Lanet , Axel Legay
11th IFIP International Conference on Information Security Theory and Practice (WISTP), Sep 2017, Heraklion, Greece. pp.93-109, ⟨10.1007/978-3-319-93524-9_6⟩
Conference papers hal-01875521v1
Image document

Reconstruction attack through classifier analysis

Sébastien Gambs , Ahmed Gmati , Michel Hurfin
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.274-281, ⟨10.1007/978-3-642-31540-4_21⟩
Conference papers hal-00736945v1
Image document

Practical and Privacy-Preserving TEE Migration

Ghada Arfaoui , Jean-François Lalande , Saïd Gharout , Jacques Traoré
9th Workshop on Information Security Theory and Practice (WISTP), Aug 2015, Heraklion, Greece. pp.153-168, ⟨10.1007/978-3-319-24018-3_10⟩
Conference papers hal-01183508v1