Personal smart devices provide users with powerful capabilities for communication, productivity, health, education, and entertainment. Applications often operate over sensitive data related to the user: collecting and processing input data from sensors (e.g., fingerprint scans, location updates), or rendering output data to the user (e.g., displaying financial information). This sensitive data is the target of many attacks, which range from malicious applications to compromises of the platform software itself, which includes the operating system (OS) and privileged services. Today, users are ultimately unable to control or reason about how their sensitive data is processed, protected, or shared. In this dissertation, I argue the following t...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Accountability ensures the proper use and distribution of digital data, including keys and programs....
Personal smart devices provide users with powerful capabilities for communication, productivity, hea...
Modern systems are mainly composed of IoT devices and Smartphones. Most of these devices use ARM pro...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering,...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
Thesis (Ph.D.)--University of Washington, 2014Today's computer users have the choice among an ever i...
Smart devices have become an integral part of our everyday life. In contrast to smartphones and lapt...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Accountability ensures the proper use and distribution of digital data, including keys and programs....
Personal smart devices provide users with powerful capabilities for communication, productivity, hea...
Modern systems are mainly composed of IoT devices and Smartphones. Most of these devices use ARM pro...
Modern society is increasingly surrounded by, and is growing accustomed to, a wide range of Cyber-Ph...
Modern systems are mainly composed of IoT devices and Smartphones.Most of these devices use ARM proc...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering,...
We are living in the time of the digital revolution in which the world we know changes beyond recogn...
Thesis (Ph.D.)--University of Washington, 2014Today's computer users have the choice among an ever i...
Smart devices have become an integral part of our everyday life. In contrast to smartphones and lapt...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Many corporations, private organizations, and government agencies maintain sensitive data that must ...
The advent of Trusted Execution Environments (TEEs) for IoT aligns with the reinforcement of IoT sec...
Trust is vital for arbitrary entities to interact and cooperate. These entities may have different s...
Accountability ensures the proper use and distribution of digital data, including keys and programs....