메뉴 건너뛰기




Volumn , Issue , 2014, Pages

Building trusted path on untrusted device drivers for mobile devices

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; HUMAN COMPUTER INTERACTION; MALWARE;

EID: 84906872126     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2637166.2637225     Document Type: Conference Paper
Times cited : (65)

References (15)
  • 3
    • 84970901426 scopus 로고    scopus 로고
    • Touchlogger: Inferring keystrokes on touch screen from smartphone motion
    • L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In Proc. Usenix HotSec, 2011.
    • Proc. Usenix HotSec, 2011
    • Cai, L.1    Chen, H.2
  • 5
    • 84893294002 scopus 로고    scopus 로고
    • Crossover: Secure and usable user interface for mobile devices with multiple isolated os personalities
    • ACM
    • M. Lange and S. Liebergeld. Crossover: secure and usable user interface for mobile devices with multiple isolated os personalities. In Proc. ACSAC, pages 249-257. ACM, 2013.
    • (2013) Proc. ACSAC , pp. 249-257
    • Lange, M.1    Liebergeld, S.2
  • 9
    • 77952132371 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for tcb minimization
    • ACM
    • J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for tcb minimization. In OS Review, volume 42, pages 315-328. ACM, 2008.
    • (2008) OS Review , vol.42 , pp. 315-328
    • McCune, J.M.1    Parno, B.J.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 10
    • 78650861686 scopus 로고    scopus 로고
    • Safe passage for passwords and other sensitive data
    • J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS, 2009.
    • (2009) NDSS
    • McCune, J.M.1    Perrig, A.2    Reiter, M.K.3
  • 11
    • 84906870352 scopus 로고    scopus 로고
    • Microsoft Jan
    • Microsoft. How interactive logon works. http://technet.microsoft.com/en- us/library/cc780332 (v=ws.10).aspx, Jan 2009.
    • (2009) How Interactive Logon Works
  • 12
    • 84897768729 scopus 로고    scopus 로고
    • Using arm trust-zone to build a trusted language runtime for mobile applications
    • ACM
    • N. Santos, H. Raj, S. Saroiu, and A. Wolman. Using arm trust-zone to build a trusted language runtime for mobile applications. In Proc. ASPLOS. ACM, 2014.
    • (2014) Proc. ASPLOS
    • Santos, N.1    Raj, H.2    Saroiu, S.3    Wolman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.