My research is mostly focused on Trusted Computing, with a special interest in the TPM. I also make occasional detours into other areas such as Cryptography or Malware detection.
L. Karlsson, M. Hell, P. Stankovski: “Improved Greedy Nonrandomness Detectors for Stream Ciphers”. 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, pp. 225–232, SCITEPRESS. DOI: 10.5220/0006268202250232
L. Karlsson, M. Hell: “Enabling Key Migration Between Non-Compatible TPM Versions”. Trust and Trustworthy Computing, TRUST 2016, Vienna, Austria, Vol. 9824, pp. 101–118, Springer. DOI: 10.1007/978-3-319-45572-3_6
M. Hell, L. Karlsson, B. Smeets, J. Mirosavljevic: “Using TPM Secure Storage in Trusted High Availability Systems”. The 6th International Conference on Trusted Systems, INTRUST 2014, Beijing, China, Vol. 9473, pp. 243–258, Springer. DOI: 10.1007/978-3-319-27998-5_16
C. Jämthagen, L. Karlsson, P. Stankovski, M. Hell: “eavesROP: Listening for ROP Payloads in Data Streams”. Information Security Conference, ISC 2014, Hong Kong, Vol. 8783, pp. 413–424, Springer. DOI: 10.1007/978-3-319-13257-0_25
You may also take a look at my page at Lund University’s Research Portal.