N. Asokan
Identifiers
No identifiers captured yet.
Papers (40)
- PAL*M: Property Attestation for Large Generative Models cs.CR · 2026 · author #5
- Resolving Availability and Run-time Integrity Conflicts in Real-Time Embedded Systems cs.CR · 2025 · author #3
- Locket: Robust Feature-Locking Technique for Language Models cs.CR · 2025 · author #3
- Text Analysis in Adversarial Settings: Does Deception Leave a Stylistic Trace? cs.CL · 2019 · author #2
- Exploitation Techniques and Defenses for Data-Oriented Attacks cs.CR · 2019 · author #7
- PAC it up: Towards Pointer Integrity using ARM Pointer Authentication cs.CR · 2018 · author #6
- All You Need is "Love": Evading Hate-speech Detection cs.CL · 2018 · author #5
- ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices cs.CR · 2018 · author #1
- PRADA: Protecting against DNN Model Stealing Attacks cs.CR · 2018 · author #4
- Stay On-Topic: Generating Context-specific Fake Restaurant Reviews cs.CR · 2018 · author #4
- Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials cs.CR · 2018 · author #4
- D\"IoT: A Federated Self-learning Anomaly Detection System for IoT cs.CR · 2018 · author #5
- Migrating SGX Enclaves with Persistent State cs.CR · 2018 · author #4
- DoubleEcho: Mitigating Context-Manipulation Attacks in Copresence Verification cs.CR · 2018 · author #6
- SafeKeeper: Protecting Web Passwords using Trusted Execution Environments cs.CR · 2017 · author #5
- CFI CaRE: Hardware-supported Call and Return Enforcement for Commercial Microcontrollers cs.CR · 2017 · author #4
- LO-FAT: Low-Overhead Control Flow ATtestation in Hardware cs.CR · 2017 · author #7
- HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement cs.CR · 2017 · author #6
- Profiling Users by Modeling Web Transactions cs.CR · 2017 · author #3
- Scalable Byzantine Consensus via Hardware-assisted Secret Sharing cs.CR · 2016 · author #4
- IoT Sentinel: Automated Device-Type Identification for Security Enforcement in IoT cs.CR · 2016 · author #4
- STASH: Securing transparent authentication schemes using prover-side proximity verification cs.CR · 2016 · author #5
- Towards Fairness of Cryptocurrency Payments cs.CR · 2016 · author #4
- SELint: an SEAndroid policy analysis tool cs.CR · 2016 · author #3
- The Circle Game: Scalable Private Membership Test Using Trusted Hardware cs.CR · 2016 · author #6
- C-FLAT: Control-FLow ATtestation for Embedded Systems Software cs.CR · 2016 · author #2
- OmniShare: Securely Accessing Encrypted Cloud Storage from Multiple Authorized Devices cs.CR · 2015 · author #8
- Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems cs.CR · 2015 · author #3
- Know Your Phish: Novel Techniques for Detecting Phishing Sites and their Targets cs.CR · 2015 · author #4
- Characterizing SEAndroid Policies in the Wild cs.CR · 2015 · author #5
- On Making Emerging Trusted Execution Environments Accessible to Developers cs.CR · 2015 · author #3
- Open-TEE - An Open Virtual Trusted Execution Environment cs.CR · 2015 · author #4
- Pitfalls in Designing Zero-Effort Deauthentication: Opportunistic Human Observation Attacks cs.CR · 2015 · author #6
- LookAhead: Augmenting Crowdsourced Website Reputation Systems With Predictive Modeling cs.CR · 2015 · author #3
- How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL cs.CR · 2014 · author #4
- Citizen Electronic Identities using TPM 2.0 cs.CR · 2014 · author #3
- Security of OS-level virtualization technologies: Technical report cs.CR · 2014 · author #4
- The Company You Keep: Mobile Malware Infection Rates and Inexpensive Risk Indicators cs.CR · 2013 · author #6
- ConXsense - Automated Context Classification for Context-Aware Access Control cs.CR · 2013 · author #5
- PeerShare: A System Secure Distribution of Sensitive Data Among Social Contacts cs.CR · 2013 · author #2
Mentions
No mention provenance yet.
Frequent Coauthors
- Thomas Nyman 12 shared papers
- Ahmad-Reza Sadeghi 9 shared papers
- Andrew Paverd 8 shared papers
- Jan-Erik Ekberg 5 shared papers
- Samuel Marchal 5 shared papers
- Mika Juuti 4 shared papers
- Arseny Kurnikov 3 shared papers
- Elena Reshetova 3 shared papers
- Hans Liljestrand 3 shared papers
- Jian Liu 3 shared papers
- Lucas Davi 3 shared papers
- Markus Miettinen 3 shared papers
- Sasu Tarkoma 3 shared papers
- Thien Duc Nguyen 3 shared papers
- Tommi Gr\"ondahl 3 shared papers
- Brian McGillion 2 shared papers
- Filippo Bonazzi 2 shared papers
- Gene Tsudik 2 shared papers
- Ghada Dessouky 2 shared papers
- Ghassan O. Karame 2 shared papers