-
1
-
-
84856339532
-
35% of American adults own a smartphone
-
Pew Research Center July
-
Smith, A.: 35% of American adults own a smartphone. Pew Internet and American Life Project. Pew Research Center (July 2011)
-
(2011)
Pew Internet and American Life Project
-
-
Smith, A.1
-
2
-
-
84879866927
-
The Lost Smartphone Problem: Benchmark study of U.S. Organizations
-
Ponemon Institute LLC. sponsored by McAfee October
-
Ponemon Institute LLC. The Lost Smartphone Problem: Benchmark study of U.S. organizations. In: Ponemon Institute Research Report. sponsored by McAfee (October 2011)
-
(2011)
Ponemon Institute Research Report
-
-
-
4
-
-
85077701725
-
Lest We Remember: Cold Boot Attacks on Encryptions Keys
-
Princeton University, USENIX Association August
-
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryptions Keys. In: Proceedings of the 17th USENIX Security Symposium, San Jose, CA, August 2008, pp. 45-60. Princeton University, USENIX Association (August 2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium, San Jose, CA, August 2008
, pp. 45-60
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
6
-
-
84936765571
-
-
Technical report, NIST, Computer Security Division, Information Technology Laboratory December
-
Turan, M., Barker, E., Burr, W., Chen, L.: Special Publication 800-132: Recommendation for Password-Based Key Derivation. Technical report, NIST, Computer Security Division, Information Technology Laboratory (December 2010)
-
(2010)
Special Publication 800-132: Recommendation for Password-Based Key Derivation
-
-
Turan, M.1
Barker, E.2
Burr, W.3
Chen, L.4
-
7
-
-
84961346783
-
Smudge Attacks on Smartphone Touch Screens
-
Department of Computer and Information Science, University of Pennsylvania August
-
Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge Attacks on Smartphone Touch Screens. In: WOOT 2010, 4th USENIX Workshop on Offensive Technologies. Department of Computer and Information Science, University of Pennsylvania (August 2010)
-
(2010)
WOOT 2010, 4th USENIX Workshop on Offensive Technologies
-
-
Aviv, A.J.1
Gibson, K.2
Mossop, E.3
Blaze, M.4
Smith, J.M.5
-
8
-
-
84879858067
-
Android facial recognition based unlocking can be fooled with photo
-
November
-
Kumar, M.: Android facial recognition based unlocking can be fooled with photo. The Hacker News (November 2011), http://thehackernews.com/
-
(2011)
The Hacker News
-
-
Kumar, M.1
-
9
-
-
27244454816
-
Data Remanence in Flash Memory Devices
-
Rao, J.R., Sunar, B. (eds.) CHES 2005. Springer, Heidelberg
-
Skorobogatov, S.: Data Remanence in Flash Memory Devices. In: Rao, J.R., Sunar, B. (eds.) CHES 2005. LNCS, vol. 3659, pp. 339-353. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3659
, pp. 339-353
-
-
Skorobogatov, S.1
-
10
-
-
0002380073
-
Tamper Resistance - A Cautionary Note
-
USENIX Association November
-
Anderson, R., Kuhn, M.: Tamper Resistance - a Cautionary Note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California, pp. 1-11. USENIX Association (November 1996)
-
(1996)
The Second USENIX Workshop on Electronic Commerce Proceedings, Oakland, California
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
11
-
-
84871572206
-
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices withou Clocks
-
UMass Amherst, USENIX Association August
-
Rahmati, A., Salajegheh, M., Holcomb, D., Sorber, J., Burleson, W., Fu, K.: TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices withou Clocks. In: 21st USENIX Security Symposium, Bellevue, WA, UMass Amherst, USENIX Association (August 2012)
-
(2012)
21st USENIX Security Symposium, Bellevue, WA
-
-
Rahmati, A.1
Salajegheh, M.2
Holcomb, D.3
Sorber, J.4
Burleson, W.5
Fu, K.6
-
12
-
-
84856101295
-
We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags
-
Polytechnic Institute of New York University July
-
Saxena, N., Voris, J.: We Can Remember It for You Wholesale: Implications of Data Remanence on the Use of RAM for True Random Number Generation on RFID Tags. In: 5th Workshop on RFID Security (RFIDSec), Leuven, Belgium, Polytechnic Institute of New York University (July 2009)
-
(2009)
5th Workshop on RFID Security (RFIDSec), Leuven, Belgium
-
-
Saxena, N.1
Voris, J.2
-
15
-
-
84879847922
-
-
Thread 1046748 April
-
xdadevelopers. GT-i9100 Galaxy SII FAQ. Thread 1046748 (April 2011), http://forum.xda-developers.com
-
(2011)
GT-i9100 Galaxy SII FAQ
-
-
-
16
-
-
84892416323
-
LiME - Linux Memory Extractor
-
Digital Forensics Solutions, LLC January
-
Sylve, J.: LiME - Linux Memory Extractor. In: ShmooCon 2012, Washingtion, D.C. Digital Forensics Solutions, LLC (January 2012)
-
(2012)
ShmooCon 2012, Washingtion, D.C.
-
-
Sylve, J.1
-
17
-
-
84879850490
-
-
April
-
Zugelder, M.: androidcrypt.py (April 2012), https://github.com/michael42/ androidcrypt.py/
-
(2012)
Androidcrypt.Py
-
-
Zugelder, M.1
-
18
-
-
84929586321
-
Into the Droid: Gaining Access to Android User Data
-
VIA Forensics July
-
Cannon, T., Bradford, S.: Into the Droid: Gaining Access to Android User Data. In: DefCon 2012. VIA Forensics (July 2012)
-
(2012)
DefCon 2012
-
-
Cannon, T.1
Bradford, S.2
-
19
-
-
85029521796
-
TRESOR Runs Encryption Securely Outside RAM
-
University of Erlangen-Nuremberg, USENIX Association August
-
Müller, T., Freiling, F., Dewald, A.: TRESOR Runs Encryption Securely Outside RAM. In: 20th USENIX Security Symposium, San Francisco, California. University of Erlangen-Nuremberg, USENIX Association (August 2011)
-
(2011)
20th USENIX Security Symposium, San Francisco, California
-
-
Müller, T.1
Freiling, F.2
Dewald, A.3
-
20
-
-
84863479473
-
TreVisor: OS-Independent Software- Based Full Disk Encryption Secure Against Main Memory Attacks
-
Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. Springer, Heidelberg
-
Müller, T., Taubmann, B., Freiling, F.C.: TreVisor: OS-Independent Software- Based Full Disk Encryption Secure Against Main Memory Attacks. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol. 7341, pp. 66-83. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7341
, pp. 66-83
-
-
Müller, T.1
Taubmann, B.2
Freiling, F.C.3
|