메뉴 건너뛰기




Volumn , Issue , 2009, Pages 429-434

T-PIM: Trusted password input method against data stealing malware

Author keywords

[No Author keywords available]

Indexed keywords

ANTI VIRUS; END USERS; FINANCIAL SERVICE; HYPERVISOR; INPUT METHODS; INTERNET BASED; MALWARES; ON-LINE BANKING; ONLINE SHOPPING; OPERATING SYSTEMS; PASSWORD PROTECTION; PERFORMANCE MEASUREMENTS; PROTOTYPE IMPLEMENTATIONS;

EID: 77951125555     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2009.35     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 5
    • 55549097262 scopus 로고    scopus 로고
    • Subverting Vista Kernel for Fun and Profit
    • July
    • Joanna Rutkowska. Subverting Vista Kernel For Fun and Profit. In SyScan'06, July 2006.
    • (2006) SyScan'06
    • Rutkowska, J.1
  • 7
    • 0041983776 scopus 로고
    • VM/370 - A study of multiplicity and usefulness
    • L. Seawright and R. MacKinnon. VM/370 - a study of multiplicity and usefulness. IBM Systems Journal, pages 4-17, 1979.
    • (1979) IBM Systems Journal , pp. 4-17
    • Seawright, L.1    MacKinnon, R.2
  • 8
    • 84879848814 scopus 로고
    • Application and analysis of the virtual machine approach to information system security and isolation
    • ACM Press
    • Stuart E. Madnick and John J. Donovan. Application and analysis of the virtual machine approach to information system security and isolation, Proceedings of the workshop on virtual computer systems. In ACM Press, pages 210-224, 1973.
    • (1973) Proceedings of the Workshop on Virtual Computer Systems , pp. 210-224
    • Madnick, S.E.1    Donovan, J.J.2
  • 9
    • 77951140308 scopus 로고    scopus 로고
    • Department of defense trusted computer system evaluation criteria
    • DEPARTMENT OF DEFENSE STANDARD Dec
    • DEPARTMENT OF DEFENSE STANDARD. Department of defense trusted computer system evaluation criteria. DoD 5200.28-STD, Dec 1998.
    • (1998) DoD 5200.28-STD
  • 14
    • 70749106620 scopus 로고    scopus 로고
    • Trusted Computing Group. Version 1.2
    • Trusted Computing Group. TPM Specification, Version 1.2.
    • TPM Specification
  • 16
    • 77951104901 scopus 로고    scopus 로고
    • Retrieved Oct. 30, 2008
    • Dan Boneh, Srinivas Inguva, and Ian Baker. SSL MITM Proxy. http://crypto.stanford.edu/ssl-mitm/, 2007. (Retrieved Oct. 30, 2008).
    • (2007) SSL MITM Proxy
    • Boneh, D.1    Inguva, S.2    Baker, I.3
  • 17
    • 77951141099 scopus 로고    scopus 로고
    • version 9.9. Retrieved Oct. 30, 2008
    • Yutaka Sato, et al. The Reference Manual of Dele-Gate version 9.9. http://www.delegate.org/, 2008. (Retrieved Oct. 30, 2008).
    • (2008) The Reference Manual of Dele-Gate
    • Sato, Y.1
  • 18
    • 77951131949 scopus 로고    scopus 로고
    • JUMPERZ.NET. Retrieved Oct. 30, 2008
    • JUMPERZ.NET. Open source web application firewall. http://guardian. jumperz.net/, 2007. (Retrieved Oct. 30, 2008).
    • (2007) Open Source Web Application Firewall
  • 20
    • 77951113316 scopus 로고    scopus 로고
    • Retrieved Oct. 30, 2008
    • The Apache Jakarta Project. JMeter. http://jakarta.apache.org/jmeter/, 1998. (Retrieved Oct. 30, 2008).
    • (1998) JMeter


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.