Siniša Matetić
YOU?
Author Swipe
View article: Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training
Content, Nudges and Incentives: A Study on the Effectiveness and Perception of Embedded Phishing Training Open
A common form of phishing training in organizations is the use of simulated\nphishing emails to test employees' susceptibility to phishing attacks, and the\nimmediate delivery of training material to those who fail the test. This\nwidespre…
View article: Bitcontracts: Supporting Smart Contracts in Legacy Blockchains
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains Open
In this paper, our main goal is to design a solution that adds expressive smart contract execution support as a subsystem to existing legacy blockchain systems.The primary usage of our solution is to enhance systems like Bitcoin that have …
View article: ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts Open
Smart contracts are programmable, decentralized and transparent financial applications. Because smart contract platforms typically support Turing-complete programming languages, such systems are often said to enable arbitrary applications.…
View article: TEEvil: Identity Lease via Trusted Execution Environments
TEEvil: Identity Lease via Trusted Execution Environments Open
We investigate identity lease, a new type of service in which users lease their identities to third parties by providing them with full or restricted access to their online accounts or credentials. We discuss how identity lease could be ab…
View article: Secure Brokered Delegation Through DelegaTEE
Secure Brokered Delegation Through DelegaTEE Open
ISSN:1540-7993
View article: DelegaTEE: Brokered Delegation Using Trusted Execution Environments
DelegaTEE: Brokered Delegation Using Trusted Execution Environments Open
We introduce a new concept called brokered delegation. Brokered delegation allows users to flexibly delegate credentials and rights for a range of service providers to other users and third parties. We explore how brokered delegation can b…
View article: ROTE: Rollback Protection for Trusted Execution
ROTE: Rollback Protection for Trusted Execution Open
Security architectures such as Intel SGX need protection against rollback attacks, where the adversary violates the integrity of a protected application state by re-playing old persistently stored data or by starting multiple application i…