What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marcus Peinado
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/ccs
Hacksaw: Hardware-Centric Kernel Debloating via Device Inventory and Dependency Analysis.
Zhenghao Hu
Sangho Lee
Marcus Peinado
2023
conf/uss
Rethinking System Audit Architectures for High Event Coverage and Synchronous Log Availability.
Varun Gandhi
Sarbartha Banerjee
Aniket Agrawal
Adil Ahmad
Sangho Lee
Marcus Peinado
2022
conf/sp
HARDLOG: Practical Tamper-Proof System Auditing Using a Novel Audit Device.
Adil Ahmad
Sangho Lee
Marcus Peinado
2022
conf/acsac
Spacelord: Private and Secure Smart Space Sharing.
Yechan Bae
Sarbartha Banerjee
Sangho Lee
Marcus Peinado
2020
conf/ccs
The Lazarus Effect: Healing Compromised Devices in the Internet of Small Things.
Manuel Huber
Stefan Hristozov
Simon Ott
Vasil Sarafov
Marcus Peinado
2019
conf/sp
Dominance as a New Trusted Computing Primitive for the Internet of Things.
Meng Xu
Manuel Huber
Zhichuang Sun
Paul England
Marcus Peinado
Sangho Lee
Andrey Marochko
Dennis Mattoon
Rob Spiger
Stefan Thom
2017
conf/uss
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing.
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
2017
conf/uss
Hacking in Darkness: Return-oriented Programming against Secure Enclaves.
Jae-Hyuk Lee
Jin Soo Jang
Yeongjin Jang
Nohyun Kwak
Yeseul Choi
Changho Choi
Taesoo Kim
Marcus Peinado
Brent ByungHoon Kang
2017
conf/ndss
T-SGX: Eradicating Controlled-Channel Attacks Against Enclave Programs.
Ming-Wei Shih
Sangho Lee
Taesoo Kim
Marcus Peinado
2015
conf/sp
Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems.
Yuanzhong Xu
Weidong Cui
Marcus Peinado
2015
conf/sp
VC3: Trustworthy Data Analytics in the Cloud Using SGX.
Felix Schuster
Manuel Costa
Cédric Fournet
Christos Gkantsidis
Marcus Peinado
Gloria Mainar-Ruiz
Mark Russinovich
2013
conf/ccs
deDacota: toward preventing server-side XSS via automatic code and data separation.
Adam Doupé
Weidong Cui
Mariusz H. Jakubowski
Marcus Peinado
Christopher Kruegel
Giovanni Vigna
2012
conf/uss
Tracking Rootkit Footprints with a Practical Memory Analysis System.
Weidong Cui
Marcus Peinado
Zhilei Xu
Ellick Chan
2012
conf/uss
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud.
Taesoo Kim
Marcus Peinado
Gloria Mainar-Ruiz
2009
conf/ccs
Mapping kernel objects to enable systematic integrity checking.
Martim Carbone
Weidong Cui
Long Lu
Wenke Lee
Marcus Peinado
Xuxian Jiang
2008
conf/ccs
Tupni: automatic reverse engineering of input formats.
Weidong Cui
Marcus Peinado
Karl Chen
Helen J. Wang
Luis Irún-Briz
2007
conf/sp
ShieldGen: Automatic Data Patch Generation for Unknown Vulnerabilities with Informed Probing.
Weidong Cui
Marcus Peinado
Helen J. Wang
Michael E. Locasto
2004
conf/acisp
NGSCB: A Trusted Open System.
Marcus Peinado
Yuqun Chen
Paul England
John Manferdelli
2002
conf/ccs
The Darknet and the Future of Content Protection.
Peter Biddle
Paul England
Marcus Peinado
Bryan Willman
2002
conf/acisp
Authenticated Operation of Open Computing Devices.
Paul England
Marcus Peinado
1998
conf/eurocrypt
Speeding up Discrete Log and Factoring Based Schemes via Precomputations.
Victor Boyko
Marcus Peinado
Ramarathnam Venkatesan
Coauthors
Adam Doupé
(1)
Adil Ahmad
(2)
Andrey Marochko
(1)
Aniket Agrawal
(1)
Brent ByungHoon Kang
(1)
Bryan Willman
(1)
Cédric Fournet
(1)
Changho Choi
(1)
Christopher Kruegel
(1)
Christos Gkantsidis
(1)
Dennis Mattoon
(1)
Ellick Chan
(1)
Felix Schuster
(1)
Giovanni Vigna
(1)
Gloria Mainar-Ruiz
(2)
Helen J. Wang
(2)
Hyesoon Kim
(1)
Jae-Hyuk Lee
(1)
Jin Soo Jang
(1)
John Manferdelli
(1)
Karl Chen
(1)
Long Lu
(1)
Luis Irún-Briz
(1)
Manuel Costa
(1)
Manuel Huber
(2)
Marcus Peinado
(21)
Mariusz H. Jakubowski
(1)
Mark Russinovich
(1)
Martim Carbone
(1)
Meng Xu
(1)
Michael E. Locasto
(1)
Ming-Wei Shih
(2)
Nohyun Kwak
(1)
Paul England
(4)
Peter Biddle
(1)
Prasun Gera
(1)
Ramarathnam Venkatesan
(1)
Rob Spiger
(1)
Sangho Lee
(7)
Sarbartha Banerjee
(2)
Simon Ott
(1)
Stefan Hristozov
(1)
Stefan Thom
(1)
Taesoo Kim
(4)
Varun Gandhi
(1)
Vasil Sarafov
(1)
Victor Boyko
(1)
Weidong Cui
(6)
Wenke Lee
(1)
Xuxian Jiang
(1)
Yechan Bae
(1)
Yeongjin Jang
(1)
Yeseul Choi
(1)
Yuanzhong Xu
(1)
Yuqun Chen
(1)
Zhenghao Hu
(1)
Zhichuang Sun
(1)
Zhilei Xu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to