Main navigation | Main content
Reading (2/3) for Thursday, April 21st:
Vasiios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan
Klinec, and George Danezis.
“A Touch of Evil: High-Assurance Cryptographic Hardware from
Untrusted Components.”
In ACM CCS,
October 2017.
[ACM DL]
Reading (2/2) for Tuesday, April 19th:
Kaiyuan Yang, Matthew Hicks, Qing Dong, Todd Austin, and Dennis
Sylvester.
“A2: Analog Malicious Hardware.”
In IEEE Security and Privacy,
May 2016.
[IEEE Xplore]
Reading (1/3) for Thursday, April 21st:
Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried,
Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann,
Eric Rescorla, and Hovav Shacham.
“A Systematic Analysis of the Juniper Dual EC Incident.”
In ACM CCS,
August 2016.
[ACM DL]
Reading (1/2) for Tuesday, April 19th:
Xavier de Carné de Carnavalet and Mohammad Mannan.
“Challenges and implications of verifiable builds for
security-critical open-source software.”
In Annual Computer Security Applications Conference (ACSAC),
December 2014.
[ACM DL]
Reading (3/3) for Thursday, April 21st:
David A. Wheeler.
“Countering Trusting Trust through Diverse
Double-Compiling.”
In Annual Computer Security Applications Conference (ACSAC),
December 2005.
[Author's copy]
[Author's page]