Together with one of my former students, we recently published a paper on the ACM Transactions on Embedded Computing Systems that explores alternative ways of performing remote attestation
Together with one of my former students and Security Pattern researchers, we recently presented a paper at Cosade 2023 that explores the use of low-cost devices to execute such attacks.
This is a more of a personal memo about dependent typing (and Haskell) than anything else. I expect to write more about this subject as I move forward to other subjects in type theory.
Cryptography’s current research trends show that there is an increasing concern about identifying if a side-channel countermeasure is vulnerable to higher-order attacks. In this post, I'll recap the major findings of a paper I've co-authored with two colleagues.
One of the major struggles as a University professor is to create compelling examples for introductory courses to computer science. In this small post, I'll sum up how I've built a small embedded system for teaching remote temperature monitoring.