Martin Hell

Universitetslektor
Fler filtreringsmöjligheter
  1. 2021
  2. Flowrider: Fast On-Demand Key Provisioning for Cloud Networks

    Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh & Martin Hell, 2021 maj 24, (Accepted/In press) SecureComm 2021 - Proceedings of the 2021 EAI International Conference on Security and Privacy in Communication Networks. EAI

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  3. On-demand Key Distribution for Cloud Networks

    Nicolae Paladi, Marco Tiloca, Pegah Nikbakht Bideh & Martin Hell, 2021 mar 4, Proceedings of the 24th Conference on Innovation in Clouds, Internet and Networks. IEEE - Institute of Electrical and Electronics Engineers Inc.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  4. Using Program Analysis to Identify the Use of Vulnerable Functions

    Rasmus Hagberg, Martin Hell & Christoph Reichenbach, 2021, (Accepted/In press) 18th International Conference on Security and Cryptography, SECRYPT 2021. INSTICC Press

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  5. 2020
  6. Electromagnetic Side-Channel Attack on AES using Low-end Equipment

    Oskar Westman & Martin Hell, 2020 jun 3, I: ECTI Transactions on Computer and Information Technology. 14, 2, s. 139-148

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  7. Software Evaluation of Grain-128AEAD for Embedded Platforms

    Alexander Maximov & Martin Hell, 2020 jun 1, IACR.

    Forskningsoutput: Bok/rapportRapport

  8. Software Defined Networking for Emergency Traffic Management in Smart Cities

    Pegah Nikbakht Bideh, Nicolae Paladi & Martin Hell, 2020 apr 8, Vehicular Ad-hoc Networks for Smart Cities: Third International Workshop, 2019. Laouiti, A., Qayyum, A. & Saad, M. N. M. (red.). Springer, s. 59-70 12 s. (Advances in Intelligent Systems and Computing, AISC; vol. 1144).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  9. A Recommender System for User-Specific Vulnerability Scoring

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2020, CRiSIS 2019: Risks and Security of Internet and Systems. Springer, s. 355-364 ( Lecture Notes in Computer Science; vol. 12026).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  10. Automated CPE Labeling of CVE Summaries with Machine Learning

    Emil Wåreus & Martin Hell, 2020, Detection of Intrusions and Malware, and Vulnerability Assessment - 17th International Conference, DIMVA 2020, Proceedings. Maurice, C., Bilge, L., Stringhini, G. & Neves, N. (red.). Springer, s. 3-22 20 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12223 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  11. Energy Consumption for Securing Lightweight IoT Protocols

    Pegah Nikbakht Bideh, Jonathan Sönnerup & Martin Hell, 2020, The 10th International Conference on the Internet of Things (IoT 2020). Association for Computing Machinery (ACM), 8 s. 16

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  12. Evaluation of the HAVOSS software process maturity model

    Martin Höst & Martin Hell, 2020, Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE - Institute of Electrical and Electronics Engineers Inc., s. 137-140 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  13. On the Suitability of Using SGX for Secure Key Storage in the Cloud

    Joakim Brorsson, Pegah Nikbakht Bideh, Alexander Nilsson & Martin Hell, 2020, Lecture Notes in Computer Science . Springer Science and Business Media B.V., Vol. 12395. s. 32-47

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  14. 2019
  15. Sharing of vulnerability information among companies - a survey of Swedish companies

    Thomas Olsson, Martin Hell, Martin Höst, Ulrik Franke & Markus Borg, 2019 nov 21, Euromicro Conference on Software Engineering and Advanced Applications (SEAA). IEEE - Institute of Electrical and Electronics Engineers Inc., s. 284-291 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  16. An AEAD Variant of the Grain Stream Cipher

    Martin Hell, Thomas Johansson, Willi Meier, Jonathan Sönnerup & Hirotaka Yoshida, 2019, Codes, Cryptology and Information Security: Third International Conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019, Proceedings - In Honor of Said El Hajji. Carlet, C., Guilley, S., Nitaj, A. & Souidi, E. M. (red.). Springer Nature Switzerland AG, s. 55-71 17 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  17. A Recommender System for User-specific Vulnerability Scoring (full version)

    Linus Karlsson, Pegah Nikbakht Bideh & Martin Hell, 2019, 17 s.

    Forskningsoutput: Övriga bidragÖvrigt

  18. Efficient Hardware Implementations of Grain-128AEAD

    Jonathan Sönnerup, Martin Hell, Mattias Sönnerup & Ripudaman Khattar, 2019, Progress in Cryptology – INDOCRYPT 2019 - 20th International Conference on Cryptology Proceedings. Hao, F., Ruj, S., Ruj, S. & Sen Gupta, S. (red.). Springer Gabler, s. 495-513 19 s. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11898 LNCS).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  19. Guarding the Guards: Accountable Authorities in VANETs

    Joakim Brorsson, Paul Stankovski & Martin Hell, 2019, 2018 IEEE Vehicular Networking Conference (VNC). 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  20. 2018
  21. Not so greedy: Enhanced subset exploration for nonrandomness detectors

    Linus Karlsson, Martin Hell & Paul Stankovski, 2018 jan 1, Information Systems Security and Privacy - 3rd International Conference, ICISSP 2017, Revised Selected Papers. Springer, s. 273-294 22 s. (Communications in Computer and Information Science; vol. 867).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  22. Evaluating Security of Software Through Vulnerability Metrics

    Jonathan Sönnerup & Martin Hell, 2018, Proceedings of the 2018 International Conference on Security & Management. s. 79 85 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  23. HAVOSS: A Maturity Model for Handling Vulnerabilities in Third Party OSS Components

    Pegah Nikbakht Bideh, Martin Höst & Martin Hell, 2018, Product-Focused Software Process Improvement. Springer, s. 81-97 16 s. ( Lecture Notes in Computer Science; vol. 11271).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  24. Identifying, Prioritizing and Evaluating Vulnerabilities in Third Party Code

    Alexander Cobleigh, Martin Hell, Linus Karlsson, Oscar Reimer, Jonathan Sönnerup & Daniel Wisenhoff, 2018, IEEE 22nd International Enterprise Distributed Object Computing Workshop. IEEE - Institute of Electrical and Electronics Engineers Inc., 4 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  25. Industrial Practices in Security Vulnerability Management for IoT Systems – an Interview Study

    Martin Höst, Jonathan Sönnerup, Martin Hell & Thomas Olsson, 2018, Proceedings of the 2018 International Conference on Software Engineering Research & Practice. s. 61-67

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  26. 2017
  27. Improved Greedy Nonrandomness Detectors for Stream Ciphers

    Linus Karlsson, Martin Hell & Paul Stankovski, 2017 feb, Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Porto, Portugal: SciTePress, Vol. 1. s. 225-232 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  28. Blockchain-based publishing layer for the Keyless Signing Infrastructure

    Christopher Jämthagen & Martin Hell, 2017, The 13th IEEE International Conference on Advanced and Trusted Computing. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 374-381

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  29. Espresso: A stream cipher for 5G wireless communication systems

    Elena Dubrova & Martin Hell, 2017, I: Cryptography and Communications. 9, 2, s. 273–289 27 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  30. 2016
  31. Exploiting Trust in Deterministic Builds

    Christopher Jämthagen, Patrik Lantz & Martin Hell, 2016 sep 4, Computer Safety, Reliability, and Security: 35th International Conference, SAFECOMP 2016, Trondheim, Norway, September 21-23, 2016, Proceedings. Skavhaug, A., Guiochet, J. & Bitsch, F. (red.). Springer, s. 238-249 12 s. (Lecture notes in computer science; vol. 9922).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  32. Enabling Key Migration Between Non-Compatible TPM Versions

    Linus Karlsson & Martin Hell, 2016, Trust and Trustworthy Computing. Springer, Vol. 9824. s. 101-118 8 s. (Lecture Notes in Computer Science; vol. 9824).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  33. 2015
  34. Visual Cryptography and Obfuscation: A Use-Case for Decrypting and Deobfuscating Information using Augmented Reality

    Patrik Lantz, Björn Johansson, Martin Hell & Ben Smeets, 2015, Financial Cryptography and Data Security. San Juan, Puerto Rico. Brenner, M., Christin, N., Johnson, B. & Rohloff, K. (red.). Springer, s. 261-273 13 s. (Lecture Notes in Computer Science; vol. 8976).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  35. 2014
  36. An Efficient State Recovery Attack on the X-FCSR Family of Stream Ciphers

    Paul Stankovski, Martin Hell & Thomas Johansson, 2014, I: Journal of Cryptology. 27, 1, s. 1-22

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  37. eavesROP: Listening for ROP Payloads in Data Streams

    Christopher Jämthagen, Linus Karlsson, Paul Stankovski & Martin Hell, 2014, Information Security/Lecture Notes in Computer Science. Chow, S. S. M., Camenisch, J., Hui, L. C. K. & Yiu, S. M. (red.). Springer, Vol. 8783. s. 413-424 (Lecture Notes in Computer Science; vol. 8783).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  38. eavesROP: Listening for ROP Payloads in Data Streams (preliminary full version)

    Christopher Jämthagen, Linus Karlsson, Paul Stankovski & Martin Hell, 2014, (Unpublished) [Publisher information missing].

    Forskningsoutput: Bok/rapportRapport

  39. The Efficiency of Optimal Sampling in the Random S-box Model

    Paul Stankovski, Lennart Brynielsson & Martin Hell, 2014, [Host publication title missing]. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 1712-1716

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  40. Using TPM Secure Storage in Trusted High Availability Systems

    Martin Hell, Linus Karlsson, Ben Smeets & Jelena Mirosavljevic, 2014, Trusted Systems/Lecture Notes in Computer Science. Yung, M., Zhu, L. & Yang, Y. (red.). Springer, Vol. 9473. s. 243-258 (Lecture Notes in Computer Science; vol. 9473).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  41. 2013
  42. A new instruction overlapping technique for improved anti-disassembly and obfuscation of x86 binaries

    Christopher Jämthagen, Patrik Lantz & Martin Hell, 2013, Workshop on Anti-malware Testing Research (WATeR), Montreal, QC, Canada. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 25-33

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  43. Improved Key Recovery Attack on the BEAN Stream Cipher

    Hui Wang, Martin Hell, Thomas Johansson & Martin Ågren, 2013, I: IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E96A, 6, s. 1437-1444

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  44. 2012
  45. Analysis of Xorrotation With Application to an HC-128 Variant

    Paul Stankovski, Martin Hell & Thomas Johansson, 2012, LNCS. Susilo, W., Mu, Y. & Seberry, J. (red.). Springer, Vol. 7372. s. 419-425

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  46. An Optimal Sampling Technique for Distinguishing Random S-boxes

    Paul Stankovski & Martin Hell, 2012, Information Theory Proceedings (ISIT), 2012 IEEE International Symposium on. Viswanath, P. (red.). s. 846-850 5 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  47. A Survey on Fast Correlation Attacks

    Martin Ågren, Carl Löndahl, Martin Hell & Thomas Johansson, 2012, I: Cryptography and Communications. 4, 3-4, s. 173-202

    Forskningsoutput: TidskriftsbidragÖversiktsartikel

  48. Improved distinguishers for HC-128

    Paul Stankovski, Sushmita Ruj, Martin Hell & Thomas Johansson, 2012, I: Designs, Codes and Cryptography. 63, 2, s. 225-240

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  49. Improved Distinguishers on Stream Ciphers with Certain Weak Feedback Polynomials

    Martin Hell, Thomas Johansson, Lennart Brynielsson & Håkan Englund, 2012, I: IEEE Transactions on Information Theory. 58, 9, s. 6183-6193

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  50. Improved Message Passing Techniques in Fast Correlation Attacks on Stream Ciphers

    Martin Ågren, Martin Hell, Thomas Johansson & Carl Löndahl, 2012, 7th International Symposium onTurbo Codes and Iterative Information Processing (ISTC), 2012. IEEE - Institute of Electrical and Electronics Engineers Inc., s. 260-264

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  51. On Hardware-Oriented Message Authentication

    Martin Ågren, Martin Hell & Thomas Johansson, 2012, I: IET Information Security. 6, 4, s. 329-336

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  52. 2011
  53. A New Version of Grain-128 with Authentication

    Martin Ågren, Martin Hell, Thomas Johansson & Willi Meier, 2011. 19 s.

    Forskningsoutput: KonferensbidragKonferenspaper, ej i proceeding/ej förlagsutgivet

  54. A Technique for Remote Detection of Certain Virtual Machine Monitors

    Christopher Jämthagen, Martin Hell & Ben Smeets, 2011, Trusted Systems : Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Springer, Vol. 7222. s. 129-137 (Lecture Notes in Computer Science; vol. 7222).

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  55. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time

    Martin Hell & Thomas Johansson, 2011, I: Journal of Cryptology. 24, 3, s. 427-445

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  56. Cryptanalysis of the Stream cipher BEAN

    Martin Ågren & Martin Hell, 2011, [Host publication title missing]. Association for Computing Machinery (ACM), s. 21-28 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  57. Evaluation of Some Algorithms for Hardware-Oriented Message Authentication

    Martin Ågren, Martin Hell & Thomas Johansson, 2011, [Publisher information missing]. 9 s.

    Forskningsoutput: Bok/rapportRapport

  58. Grain-128a: a new version of Grain-128 with optional authentication

    Martin Ågren, Martin Hell, Thomas Johansson & Willi Meier, 2011, I: International Journal of Wireless and Mobile Computing. 5, 1, s. 48-59

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  59. Linear Attacks on Stream Ciphers

    Martin Hell & Thomas Johansson, 2011, Advanced Linear Cryptanalysis of Block and Stream Ciphers/Cryptology and Information Security Series. IOS Press, s. 55-85

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKapitel samlingsverk

  60. On Hardware-Oriented Message Authentication with Applications Towards RFID

    Martin Ågren, Martin Hell & Thomas Johansson, 2011, 2011 Workshop on Lightweight Security & Privacy: Devices, Protocols, and Applications. Kellenberger, P. (red.). IEEE - Institute of Electrical and Electronics Engineers Inc., s. 26-33 8 s.

    Forskningsoutput: Kapitel i bok/rapport/Conference proceedingKonferenspaper i proceeding

  61. Searching for new convolutional codes using the cell broadband engine architecture

    Daniel Johnsson, Fredrik Bjärkeson, Martin Hell & Florian Hug, 2011, I: IEEE Communications Letters. 15, 5, s. 560-562

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

Föregående 1 2 Nästa