Security of OS-level virtualization technologies E Reshetova, J Karhunen, T Nyman, N Asokan Nordic Conference on Secure IT Systems, 77-93, 2014 | 92 | 2014 |
Old, new, borrowed, blue-- a perspective on the evolution of mobile platform security architectures K Kostiainen, E Reshetova, JE Ekberg, N Asokan Proceedings of the first ACM conference on Data and application security and …, 2011 | 54 | 2011 |
Mobile platform security N Asokan, L Davi, A Dmitrienko, S Heuser, K Kostiainen, E Reshetova, ... Morgan & Claypool, 2014 | 39 | 2014 |
Crowdshare: Secure mobile resource sharing N Asokan, A Dmitrienko, M Nagy, E Reshetova, AR Sadeghi, T Schneider, ... Applied Cryptography and Network Security: 11th International Conference …, 2013 | 25 | 2013 |
Characterizing SEAndroid policies in the wild E Reshetova, F Bonazzi, T Nyman, R Borgaonkar, N Asokan arXiv preprint arXiv:1510.05497, 2015 | 23 | 2015 |
SELint: an SEAndroid policy analysis tool E Reshetova, F Bonazzi, N Asokan arXiv preprint arXiv:1608.02339, 2016 | 19 | 2016 |
Security of OS-level virtualization technologies: Technical report E Reshetova, J Karhunen, T Nyman, N Asokan arXiv preprint arXiv:1407.4245, 2014 | 18 | 2014 |
Distributed security risks and opportunities in the W3C Web of Things M McCool, E Reshetova Workshop on Decentralized IoT Security and Standards (DISS), 2018 | 17 | 2018 |
Randomization can’t stop BPF JIT spray E Reshetova, F Bonazzi, N Asokan Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 17 | 2017 |
Method, apparatus and computer program product for providing object privilege modification JE Ekberg, E Reshetova US Patent 8,190,636, 2012 | 13 | 2012 |
Web of Things (WoT) Security and Privacy Guidelines E Reshetova, M McCool Candidate Recommendation. W3C, 2019 | 11 | 2019 |
Toward Linux kernel memory safety E Reshetova, H Liljestrand, A Paverd, N Asokan Software: Practice and Experience 48 (12), 2237-2256, 2018 | 9 | 2018 |
Assessment organization service based on Ethereum platform PI Danilin, AA Lukin, EN Reshetova Proceedings of the 5th international conference on actual problems of system …, 2017 | 7 | 2017 |
Mobile Platform Security–Synthesis Lectures on Information Security, Privacy, and Trust N Asokan, L Davi, A Dmitrienko, S Heuser, K Kostiainen, E Reshetova, ... Morgan & Claypool Publishers, 2013 | 7 | 2013 |
Web of Things (WoT) Security and Privacy Considerations E Reshetova, M McCool W3C, W3C Note, Sep, 2017 | 5 | 2017 |
Symbian OS platform security model B Li, E Reshetova, T Aura For a complete list of all USENIX & USENIX co-sponsored events, see http …, 2010 | 4 | 2010 |
Mobile simplified security framework overview E Reshetova, C Schaufler MeeGo Conference, 2010 | 4 | 2010 |
Mandatory Access Control for Mobile Devices E Reshetova, JE Ekberg Nokia Research, Tech. Rep., 2008, NRC-TR-2008-010, 2008 | 2 | 2008 |
FreeBSD Mandatory access control usage for implementing enterprise security policies K Bolshakov, E Reshetova arXiv preprint arXiv:0706.1755, 2007 | 2 | 2007 |
Mobile and Embedded Platform Security E Reshetova Aalto University, 2018 | | 2018 |