Kari Kostiainen
Kari Kostiainen
Senior Scientist at ETH Zurich
Verified email at inf.ethz.ch - Homepage
TitleCited byYear
Secure device pairing based on a visual channel
N Saxena, JE Ekberg, K Kostiainen, N Asokan
Security and Privacy, 2006 IEEE Symposium on, 6 pp.-313, 2006
2362006
Software grand exposure:{SGX} cache attacks are practical
F Brasser, U Müller, A Dmitrienko, K Kostiainen, S Capkun, AR Sadeghi
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
2132017
Administration of wireless local area networks
N Asokan, P Ginzboorg, S Moloney, KT Kostiainen, S Sovio, JE Ekberg, ...
US Patent 8,532,304, 2013
1582013
On-board credentials with open provisioning
K Kostiainen, JE Ekberg, N Asokan, A Rantala
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1282009
Applicability of identity-based cryptography for disruption-tolerant networking
N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo
Proceedings of the 1st international MobiSys workshop on Mobile …, 2007
992007
{ROTE}: Rollback Protection for Trusted Execution
S Matetic, M Ahmed, K Kostiainen, A Dhar, D Sommer, A Gervais, A Juels, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1289-1306, 2017
922017
Method and apparatus for authenticating a mobile device
JE Ekberg, K Kostiainen, P Laitinen, V Aarni, M Sainio, N Von Knorring, ...
US Patent 8,621,203, 2013
802013
The untapped potential of trusted execution environments on mobile devices
JE Ekberg, K Kostiainen, N Asokan
IEEE Security & Privacy 12 (4), 29-37, 2014
742014
Smartphones as Practical and Secure Location Verification Tokens for Payments.
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
NDSS 14, 23-26, 2014
712014
Method for remote message attestation in a communication system
KTJ Kostiainen, N Asokan
US Patent 7,913,086, 2011
592011
Towards securing disruption-tolerant networking
N Asokan, K Kostiainen, P Ginzboorg, J Ott, C Luo
Nokia Research Center, Tech. Rep. NRC-TR-2007-007, 2007
582007
Old, new, borrowed, blue--: a perspective on the evolution of mobile platform security architectures
K Kostiainen, E Reshetova, JE Ekberg, N Asokan
Proceedings of the first ACM conference on Data and application security and …, 2011
492011
Trusted execution environments on mobile devices
JE Ekberg, K Kostiainen, N Asokan
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
442013
Mobile trusted computing
N Asokan, JE Ekberg, K Kostiainen, A Rajan, C Rozas, AR Sadeghi, ...
Proceedings of the IEEE 102 (8), 1189-1206, 2014
422014
Credential transfer
S Holtmanns, N Asokan, KTJ Kostiainen
US Patent App. 13/513,662, 2012
372012
Security in Wireless Environments Using Out-Of-Band Channel Communication
K Kostiainen, JE Ekberg, N Saxena
US Patent App. 12/083,708, 2010
372010
Personalized security indicators to detect application phishing attacks in mobile platforms
C Marforio, RJ Masti, C Soriente, K Kostiainen, S Capkun
arXiv preprint arXiv:1502.06824, 2015
312015
Detecting mobile application spoofing attacks by leveraging user visual similarity perception
L Malisa, K Kostiainen, S Capkun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
302017
Secure device pairing based on a visual channel: Design and usability study
N Saxena, JE Ekberg, K Kostiainen, N Asokan
IEEE Transactions on Information Forensics and Security 6 (1), 28-38, 2011
302011
Secure enrollment and practical migration for mobile trusted execution environments
C Marforio, N Karapanos, C Soriente, K Kostiainen, S Capkun
Proceedings of the Third ACM workshop on Security and privacy in smartphones …, 2013
292013
The system can't perform the operation now. Try again later.
Articles 1–20