Thomas Nyman

Doctoral Candidate

Research outputs

  1. 2019
  2. Published

    Protecting the stack with PACed canaries

    Liljestrand, H., Gauhar, Z., Nyman, T., Ekberg, J-E. & Asokan, N., 27 Oct 2019, SysTEX ’19, October 27, 2019, Huntsville, ON, Canada. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  3. Published

    HardScope: Hardening Embedded Systems Against Data-Oriented Attacks

    Nyman, T., Dessouky, G., Zeitouni, S., Lehikoinen, A., Paverd, A., Asokan, N. & Sadeghi, A-R., 2 Jun 2019, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019. IEEE/ACM, 6 p. 63. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  4. Published

    Late breaking results: Authenticated call stack

    Liljestrand, H., Nyman, T., Ekberg, J. E. & Asokan, N., 2 Jun 2019, Proceedings of the 56th Annual Design Automation Conference 2019, DAC 2019. IEEE/ACM, 2 p. 223. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  5. Published

    Exploitation Techniques and Defenses for Data-Oriented Attacks

    Cheng, L., Liljestrand, H., Ahmed, M. S., Nyman, T., Jaeger, T., Asokan, N. & Yao, D. D., 2019, Proceedings - 2019 IEEE Secure Development, SecDev 2019. IEEE, p. 114-128 15 p. 8901549

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  6. Published

    PAC it up: Towards Pointer Integrity using ARM Pointer Authentication

    Liljestrand, H., Nyman, T., Wang, K., Chinea Perez, C., Ekberg, J-E. & Asokan, N., 2019, Proceedings of the 28th USENIX Security Symposium . ACM, p. 177-194

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  7. 2018
  8. Published

    ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices

    Asokan, N., Nyman, T., Rattanavipanon, N., Sadeghi, A-R. & Tsudik, G., Nov 2018, In : IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS. 37, 11, p. 2290-2300 10 p., 8493602.

    Research output: Contribution to journalArticleScientificpeer-review

  9. 2017
  10. Published

    CFI CaRE: Hardware-Supported Call and Return Enforcement for Commercial Microcontrollers

    Nyman, T., Ekberg, J-E., Davi, L. & Asokan, N., 18 Sep 2017, Research in Attacks, Intrusions, and Defenses: 20th International Symposium, RAID 2017, Atlanta, GA, USA, September 18–20, 2017, Proceedings. Dacier, M., Bailey, M., Polychronakis, M. & Antonakakis, M. (eds.). p. 259-284 25 p. ( Lecture Notes in Computer Science; vol. 10453).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  11. Published

    LO-FAT: Low-Overhead Control Flow ATtestation in Hardware

    Dessouky, G., Zeitouni, S., Nyman, T., Paverd, A., Davi, L., Koeberl, P., Asokan, N. & Sadeghi, A-R., 18 Jun 2017, Proceedings of the 54th Annual Design Automation Conference 2017, DAC 2017. IEEE, Vol. Part 128280. 5 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  12. 2016
  13. Published

    C-FLAT: Control-Flow Attestation for Embedded Systems Software

    Abera, T., Asokan, N., Davi, L., Ekberg, J-E., Nyman, T., Paverd, A., Sadeghi, A-R. & Tsudik, G., 24 Oct 2016, CCS '16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . ACM, p. 743-754 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  14. Published

    Characterizing SEAndroid policies in the wild

    Reshetova, E., Bonazzi, F., Nyman, T., Borgaonkar, R. & Asokan, N., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. p. 482-489 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  15. 2015
  16. Published

    Characterizing SEAndroid Policies in the Wild

    Reshetova, E., Bonazzi, F., Nyman, T., Borgaonkar, R. & Asokan, N., 2015, ArXiv, p. 10, (ArXiv preprints).

    Research output: Working paperProfessional

  17. Published

    On Making Emerging Trusted Execution Environments Accessible to Developers

    Nyman, T., McGillion, B. & Asokan, N., 2015, 8th Internation Conference of Trust & Trustworthy Computing, TRUST 2015, Heraklion, Crete, Greece, August 24-26, 2015. Mauro Conti, M. S. (ed.). Springer International Publishing, p. 58-67

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  18. Published

    Open-TEE - An Open Virtual Trusted Execution Environment

    McGillion, B., Dettenborn, T., Nyman, T. & Asokan, N., 2015, 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, Finland, August 20-22, 2015. IEEE, p. 400-407

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  19. 2014
  20. Published

    Citizen Electronic Identities using TPM 2.0

    Nyman, T., Ekberg, J-E. & Asokan, N., 2014, TrustED'14, Scottsdale, Arizona, USA , November 3 2014. New York, NY, USA: ACM, p. 37-48

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  21. Published

    Security of OS-Level Virtualization Technologies

    Reshetova, E., Karhunen, J., Nyman, T. & Asokan, N., 2014, 19th Nordic conference on secure it systems, NordSec 2014, Tromsø, Norway, October 15-17, 2014. p. 77-93

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

ID: 84091