-
1
-
-
84863092505
-
-
Issue 10809: Password is stored on disk in plain text August
-
Android - An Open Handset Alliance Project. Issue 10809: Password is stored on disk in plain text (August 2010), http://code.google.com
-
(2010)
Android - An Open Handset Alliance Project
-
-
-
2
-
-
84863114557
-
-
Android Developers developer.android.com accessed November
-
Android Developers. Android API: AccountManager, developer.android.com (accessed November 2011)
-
(2011)
Android API: AccountManager
-
-
-
6
-
-
84868146127
-
-
ARM Limited. Technical Report PRD29-USGC-000089 3.1, ARM February
-
ARM Limited. TrustZone API specification 3.0. Technical Report PRD29-USGC-000089 3.1, ARM (February 2009)
-
(2009)
TrustZone API Specification 3.0.
-
-
-
10
-
-
80051969895
-
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
-
Becher, M., Freiling, F.C., Hoffman, J., Holz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In: Proceedings of the IEEE Symposium on Security and Privacy (2011)
-
Proceedings of the IEEE Symposium on Security and Privacy (2011)
-
-
Becher, M.1
Freiling, F.C.2
Hoffman, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
11
-
-
84863089591
-
-
comex. jailbreakme.com accessed, November
-
comex. JailbreakMe, jailbreakme.com (accessed, November 2011)
-
(2011)
JailbreakMe
-
-
-
12
-
-
52949106502
-
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
-
Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. Springer, Heidelberg
-
Costan, V., Sarmenta, L.F.G., van Dijk, M., Devadas, S.: The Trusted Execution Module: Commodity General-Purpose Trusted Computing. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 133-148. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5189
, pp. 133-148
-
-
Costan, V.1
Sarmenta, L.F.G.2
Van Dijk, M.3
Devadas, S.4
-
14
-
-
70349242410
-
Scheduling execution of credentials in constrained secure environments
-
Ekberg, J.E., Asokan, N., Kostiainen, K., Rantala, A.: Scheduling execution of credentials in constrained secure environments. In: Proceedings of the ACMWorkshop on Scalable Trusted Computing (2008)
-
Proceedings of the ACMWorkshop on Scalable Trusted Computing (2008)
-
-
Ekberg, J.E.1
Asokan, N.2
Kostiainen, K.3
Rantala, A.4
-
16
-
-
84863114546
-
MTM implementation on the TPM emulator
-
February
-
Ekberg, J.-E., Kylänpää, M.: MTM implementation on the TPM emulator. Source code (February 2008), http://mtm.nrsec.com
-
(2008)
Source Code
-
-
Ekberg, J.-E.1
Kylänpää, M.2
-
18
-
-
0023293654
-
Design and implementation of Secure Xenix
-
Gligor,V.D., Chandersekaran, C.S.,Chapman, R.S.,Dotterer, L.J.,Hecht, M.S., Jiang,W.-D., Johri, A., Luckenbaugh, G.L., Vasudevan, N.: Design and implementation of Secure Xenix. IEEE Transactions on Software Engineering 13, 208-221 (1986)
-
(1986)
IEEE Transactions on Software Engineering
, vol.13
, pp. 208-221
-
-
Chandersekaran, C.S.1
Chapman, R.S.2
Dotterer, L.J.3
Hecht, M.S.4
Jiang, W.-D.5
Johri, A.6
Luckenbaugh, G.L.7
Vasudevan, N.8
-
19
-
-
84865815611
-
-
version 1.0. Technical Report GPD SPE 007 July
-
Global Platform Device Technology. TEE client API specification version 1.0. Technical Report GPD SPE 007 (July 2010), http://globalplatform.org
-
(2010)
TEE Client API Specification
-
-
-
20
-
-
84863098473
-
-
version 0.27. Technical Report GPD SPE 010 September
-
Global Platform Device Technology. TEE internal API specification version 0.27. Technical Report GPD SPE 010 (September 2011), http://globalplatform.org
-
(2011)
TEE Internal API Specification
-
-
-
21
-
-
84905094131
-
-
version 0.4. Technical Report GPD SPE 009 October
-
Global Platform Device Technology. TEE system architecture version 0.4. Technical Report GPD SPE 009 (October 2011), http://globalplatform.org
-
(2011)
TEE System Architecture
-
-
-
24
-
-
84863111931
-
UNIX without the superuser
-
Hecht, M.S., Carson, M.E., Chandersekaran, C.S., Chapman, R.S., Dotterrer, L.J., Gligor, V.D., Jiang, W.D., Johri, A., Luckenbaugh, G.L., Vasudevan, N.: UNIX without the superuser. In: Proceedings of USENIX Technical Conference, pp. 243-256 (1987)
-
(1987)
Proceedings of USENIX Technical Conference
, pp. 243-256
-
-
Hecht, M.S.1
Carson, M.E.2
Chandersekaran, C.S.3
Chapman, R.S.4
Dotterrer, L.J.5
Gligor, V.D.6
Jiang, W.D.7
Johri, A.8
Luckenbaugh, G.L.9
Vasudevan, N.10
-
26
-
-
84879993852
-
-
accessed, March 2012
-
Intel Corp. Intel atom processor, http://www.intel.com/content/www/us/en/ processors/atom/atom-processor.html (accessed, March 2012)
-
Intel Atom Processor
-
-
-
28
-
-
72249120603
-
SeL4: Formal verification of an OS kernel
-
Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., Sewell, T., Tuch, H., Winwood, S.: seL4: formal verification of an OS kernel. In: Proceedings of the ACM Symposium on Operating Systems Principles, SOSP (2009)
-
Proceedings of the ACM Symposium on Operating Systems Principles, SOSP (2009)
-
-
Klein, G.1
Elphinstone, K.2
Heiser, G.3
Andronick, J.4
Cock, D.5
Derrin, P.6
Elkaduwe, D.7
Engelhardt, K.8
Kolanski, R.9
Norrish, M.10
Sewell, T.11
Tuch, H.12
Winwood, S.13
-
29
-
-
79952846708
-
Old, new, borrowed, blue-a perspective on the evolution of mobile platform security architectures
-
Koistiainen, K., Reshetova, E., Ekberg, J.-E., Asokan, N.: Old, new, borrowed, blue-a perspective on the evolution of mobile platform security architectures. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY (2011)
-
Proceedings of the First ACM Conference on Data and Application Security and Privacy, CODASPY (2011)
-
-
Koistiainen, K.1
Reshetova, E.2
Ekberg, J.-E.3
Asokan, N.4
-
30
-
-
74049088382
-
On-board credentials with open provisioning
-
Kostiainen, K., Ekberg, J.E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proceedings of ASIACCS (2009)
-
Proceedings of ASIACCS (2009)
-
-
Kostiainen, K.1
Ekberg, J.E.2
Asokan, N.3
Rantala, A.4
-
32
-
-
70350757761
-
Usable security: How to get it
-
Lampson, B.: Usable security: How to get it. Communications of the ACM 52(11) (2009)
-
(2009)
Communications of the ACM
, vol.52
, Issue.11
-
-
Lampson, B.1
-
35
-
-
84863089602
-
How to build a more secure smartphone with mobile virtualization and other commercial off-the-shelf technology
-
September
-
McCammon, R.: How to build a more secure smartphone with mobile virtualization and other commercial off-the-shelf technology. Open Kernel Labs Technology White Paper (September 2010)
-
(2010)
Open Kernel Labs Technology White Paper
-
-
McCammon, R.1
-
36
-
-
77955186544
-
TrustVisor: Efficient TCB reduction and attestation
-
McCune, J.M., Li, Y., Qu, N., Zhou, Z., Datta, A., Gligor, V., Perrig, A.: TrustVisor: Efficient TCB reduction and attestation. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2010)
-
Proceedings of the IEEE Symposium on Security and Privacy (May 2010)
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
Datta, A.5
Gligor, V.6
Perrig, A.7
-
39
-
-
0016082273
-
Formal requirements for virtualizable third generation architectures
-
July
-
Popek, G.J., Goldberg, R.P.: Formal requirements for virtualizable third generation architectures. Communications of the ACM, 17 (July 1974)
-
(1974)
Communications of the ACM
, vol.17
-
-
Popek, G.J.1
Goldberg, R.P.2
-
40
-
-
33750248123
-
Building a MAC-based security architecture for the Xen opensource hypervisor
-
Sailer, R., Jaeger, T., Valdez, E., Cáceres, R., Perez, R., Berger, S., Griffin, J., van Doorn, L.: Building a MAC-based security architecture for the Xen opensource hypervisor. In: Proceedings of the Annual Computer Security Applications Conference (December 2005)
-
Proceedings of the Annual Computer Security Applications Conference (December 2005)
-
-
Sailer, R.1
Jaeger, T.2
Valdez, E.3
Cáceres, R.4
Perez, R.5
Berger, S.6
Griffin, J.7
Van Doorn, L.8
-
41
-
-
84863089601
-
Al: Wireless Network Authentication Apparatus and Methods
-
US Patent 2011/0269423 November
-
Schell, S.V., Narang, M., Caballero, R.: US Patent 2011/0269423 Al: Wireless Network Authentication Apparatus and Methods (November 2011)
-
(2011)
-
-
Schell, S.V.1
Narang, M.2
Caballero, R.3
-
42
-
-
84863096577
-
Apple iOS zero-day PDF vulnerability exposed
-
July
-
Schwartz, M.J.: Apple iOS zero-day PDF vulnerability exposed. InformationWeek (July 2011), http://www.informationweek.com/news/231001147
-
(2011)
InformationWeek
-
-
Schwartz, M.J.1
-
43
-
-
84055165137
-
-
Sun Microsystems, Inc. v3.0.1: Classic edition, Connected edition May
-
Sun Microsystems, Inc. Java card specifications v3.0.1: Classic edition, Connected edition (May 2009)
-
(2009)
Java Card Specifications
-
-
-
44
-
-
70450250883
-
-
TCG Mobile Phone Working Group. Version 1.0, Revision 7.02 April
-
TCG Mobile Phone Working Group. TCG mobile trusted module specification. Version 1.0, Revision 7.02 (April 2010)
-
(2010)
TCG Mobile Trusted Module Specification
-
-
-
45
-
-
84863089605
-
Setup of secure world environment using TrustZone
-
Texas Instruments E2E Community. Setup of secure world environment using TrustZone. OMAP35X Processors Forum (August 2010), http://e2e.ti.com
-
OMAP35X Processors Forum (August 2010)
-
-
-
49
-
-
84863114476
-
-
Xen.org. wiki.xen.org/wiki/XenARM. accessed November 2011
-
Xen.org. Xen ARMproject, wiki.xen.org/wiki/XenARM. (accessed November 2011)
-
Xen ARMproject
-
-
-
52
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
Zhou, Z., Gligor, V.D., Newsome, J.,McCune, J.M.: Building verifiable trusted path on commodity x86 computers. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2012)
-
Proceedings of the IEEE Symposium on Security and Privacy (May 2012)
-
-
Zhou, Z.1
Gligor, V.D.2
Newsome, J.3
McCune, J.M.4
|