![]() |
|
|
ACM SIGSAC Membership Application
|
TrustED'17 Table of Contents TrustED
2016 Chairs' Welcome TrustED 2016 Workshop Organization Session: Trusted Device Internals Analyzing
Thousands of Firmware Images and a Few Physical Devices. What's Next? (Page
1) Side-Channel
Attacks on Fingerprint Matching Algorithms (Page
3) Session: Trusted Physical Entities Online
Reliability Testing for PUF Key Derivation (Page
15) Evaluation
of Latch-based Physical Random Number Generator Implementation on 40
nm ASICs (Page
23) On
the Energy Cost of Channel Based Key Agreement (Page
31) |
| (Return to Top) | Session: Attacks on Secured Channels Wireless
Attacks on Automotive Remote Keyless Entry Systems (Page
43) Security
of CCTV and Video Surveillance Systems: Threats, Vulnerabilities, Attacks,
and Mitigations (Page
45) |
| (Return to Top) | Session: IoT Security IoT
Security Challenges and Ways Forward (Page
55) Looks
Good To Me: Authentication for Augmented Reality (Page
57) |