Secure and Trusted Execution: Past, Present and Future–A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems C Shepherd, G Arfaoui, I Gurulian, RP Lee, K Markantonakis, RN Akram, ... 15th IEEE International Conference on Trust, Security and Privacy in …, 2016 | 101 | 2016 |
Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments C Shepherd, RN Akram, K Markantonakis 12th International Conference on Availability, Reliability and Security, 7, 2017 | 44 | 2017 |
Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis C Shepherd, K Markantonakis, N van Heijningen, D Aboulkassimi, ... Computers & Security 111, 102471, 2021 | 40 | 2021 |
EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs C Shepherd, RN Akram, K Markantonakis 11th IFIP International Conference on Information Security Theory and …, 2017 | 28 | 2017 |
LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices C Shepherd, K Markantonakis, GA Jaloyan IEEE Security & Privacy Workshops, 2021 | 26 | 2021 |
On the Effectiveness of Ambient Sensing for NFC-based Proximity Detection by Applying Relay Attack Data I Gurulian, C Shepherd, E Frank, K Markantonakis, R Akram, K Mayes 16th IEEE International Conference on Trust, Security and Privacy in …, 2017 | 25* | 2017 |
An Exploratory Analysis of the Security Risks of the Internet of Things in Finance C Shepherd, FAP Petitcolas, RN Akram, K Markantonakis 14th International Conference on Trust, Privacy & Security in Digital …, 2017 | 24 | 2017 |
The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions C Shepherd, I Gurulian, E Frank, K Markantonakis, RN Akram, ... IEEE Security & Privacy Workshops, 2017 | 22* | 2017 |
Towards Trusted Execution of Multi-modal Continuous Authentication Schemes C Shepherd, RN Akram, K Markantonakis Proceedings of the 32nd Symposium on Applied Computing, 1444-1451, 2017 | 16 | 2017 |
Remote Credential Management with Mutual Attestation for Trusted Execution Environments C Shepherd, RN Akram, K Markantonakis 12th IFIP Interntional Conference on Information Security Theory and …, 2018 | 11 | 2018 |
Verifiable Classroom Voting: Where Cryptography Meets Pedagogy F Hao, D Clarke, C Shepherd Cambridge International Workshop on Security Protocols, 255-264, 2013 | 11 | 2013 |
Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay G Haken, K Markantonakis, I Gurulian, C Shepherd, RN Akram Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security, 21-32, 2017 | 7 | 2017 |
Privacy-enhancing fall detection from remote sensor data using multi-party computation P Mainali, C Shepherd Proceedings of the 14th International Conference on Availability …, 2019 | 5 | 2019 |
Privacy-enhancing context authentication from location-sensitive data P Mainali, C Shepherd, FAP Petitcolas Proceedings of the 14th International Conference on Availability …, 2019 | 5 | 2019 |
A Side-channel Analysis of Sensor Multiplexing for Covert Channels and Application Profiling on Mobile Devices C Shepherd, J Kalbantner, B Semal, K Markantonakis IEEE Transactions on Dependable and Secure Computing, 2023 | 4* | 2023 |
Proximity assurances based on natural and artificial ambient environments I Gurulian, K Markantonakis, C Shepherd, E Frank, RN Akram Innovative Security Solutions for Information Technology and Communications …, 2017 | 4 | 2017 |
A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles V Vagal, K Markantonakis, C Shepherd 2021 IEEE/AIAA 40th Digital Avionics Systems Conference (DASC), 1-7, 2021 | 3 | 2021 |
Comparative DQN-improved algorithms for stochastic games-based automated edge intelligence-enabled IoT malware spread-suppression strategies Y Shen, C Shepherd, CM Ahmed, S Yu, T Li IEEE Internet of Things Journal, 2024 | 2 | 2024 |
Investigating Black-Box Function Recognition Using Hardware Performance Counters C Shepherd, B Semal, K Markantonakis IEEE Transactions on Computers, 2022 | 2 | 2022 |
Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments C Shepherd Royal Holloway, University Of London, 2019 | 2 | 2019 |