PAC it up: Towards Pointer Integrity using ARM Pointer Authentication H Liljestrand, T Nyman, K Wang, CC Perez, JE Ekberg, N Asokan 28th USENIX Security Symposium (USENIX Security 19), 177-194, 2019 | 199 | 2019 |
Authenticated call stack H Liljestrand, T Nyman, JE Ekberg, N Asokan Proceedings of the 56th Annual Design Automation Conference 2019, 1-2, 2019 | 95 | 2019 |
Mitigating branch-shadowing attacks on intel sgx using control flow randomization S Hosseinzadeh, H Liljestrand, V Leppänen, A Paverd Proceedings of the 3rd Workshop on System Software for Trusted Execution, 42-47, 2018 | 35 | 2018 |
Protecting the stack with PACed canaries H Liljestrand, Z Gauhar, T Nyman, JE Ekberg, N Asokan Proceedings of the 4th Workshop on System Software for Trusted Execution, 1-6, 2019 | 33 | 2019 |
Exploitation techniques and defenses for data-oriented attacks L Cheng, H Liljestrand, MS Ahmed, T Nyman, T Jaeger, N Asokan, D Yao 2019 IEEE Cybersecurity Development (SecDev), 114-128, 2019 | 30 | 2019 |
Exploitation techniques for data-oriented attacks with existing and potential defense approaches L Cheng, S Ahmed, H Liljestrand, T Nyman, H Cai, T Jaeger, N Asokan, ... ACM Transactions on Privacy and Security (TOPS) 24 (4), 1-36, 2021 | 28 | 2021 |
Camouflage: Hardware-assisted cfi for the arm linux kernel R Denis-Courmont, H Liljestrand, C Chinea, JE Ekberg 2020 57th ACM/IEEE Design Automation Conference (DAC), 1-6, 2020 | 27 | 2020 |
STASH: Securing transparent authentication schemes using prover-side proximity verification M Juuti, C Vaas, I Sluganovic, H Liljestrand, N Asokan, I Martinovic 2017 14th Annual IEEE International Conference on Sensing, Communication …, 2017 | 16 | 2017 |
Color my world: Deterministic tagging for memory safety H Liljestrand, C Chinea, R Denis-Courmont, JE Ekberg, N Asokan arXiv preprint arXiv:2204.03781, 2022 | 14 | 2022 |
Hardware platform security for mobile devices LJ Gunn, N Asokan, JE Ekberg, H Liljestrand, V Nayani, T Nyman Foundations and Trends® in Privacy and Security 3 (3-4), 214-394, 2022 | 13 | 2022 |
EC-CFI: Control-flow Integrity via code encryption counteracting fault attacks P Nasahl, S Sultana, H Liljestrand, K Grewal, M LeMay, DM Durham, ... 2023 IEEE International Symposium on Hardware Oriented Security and Trust …, 2023 | 10 | 2023 |
Toward Linux kernel memory safety E Reshetova, H Liljestrand, A Paverd, N Asokan Software: Practice and Experience 48 (12), 2237-2256, 2018 | 9 | 2018 |
Not all data are created equal: Data and pointer prioritization for scalable protection against {Data-Oriented} attacks S Ahmed, H Liljestrand, H Jamjoom, M Hicks, N Asokan, DD Yao 32nd USENIX Security Symposium (USENIX Security 23), 1433-1450, 2023 | 5 | 2023 |
Exploitation techniques and defenses for data-oriented attacks. In 2019 IEEE Cybersecurity Development (SecDev) L Cheng, H Liljestrand, MS Ahmed, T Nyman, T Jaeger, N Asokan, D Yao IEEE, 2019 | 5 | 2019 |
BliMe: Verifiably secure outsourced computation with hardware-enforced taint tracking H ElAtali, LJ Gunn, H Liljestrand, N Asokan arXiv preprint arXiv:2204.09649, 2022 | 4 | 2022 |
Updating encrypted security context in stack pointers for exception handling and tight bounding of on-stack arguments HG Liljestrand, S Deutsch, DM Durham, M LeMay, KS Grewal US Patent 12,216,922, 2025 | 3 | 2025 |
Changing the way the world works: IBM Research’s “5 in 5” A Krishna, AI Trustworthy, N Körtge, G Dittmann, S Dragone, PG Kannan, ... Quantum, 2024 | 3 | 2024 |
Tutorial: Investigating advanced exploits for system security assurance S Ahmed, L Cheng, H Liljestrand, N Asokan, DD Yao 2021 IEEE Secure Development Conference (SecDev), 3-4, 2021 | 2 | 2021 |
Implementing Prover-Side Proximity Verification for Strengthening Transparent Authentication M Juuti, C Vaas, H Liljestrand, I Sluganovic, N Asokan, I Martinovic 2017 14th Annual IEEE International Conference on Sensing, Communication …, 2017 | 2 | 2017 |
BliMe Linter H ElAtali, X Duan, H Liljestrand, M Xu, N Asokan 2024 IEEE Secure Development Conference (SecDev), 46-53, 2024 | 1 | 2024 |