-
3
-
-
84970901426
-
Touchlogger: Inferring keystrokes on touch screen from smartphone motion
-
L. Cai and H. Chen. Touchlogger: inferring keystrokes on touch screen from smartphone motion. In Proc. Usenix HotSec, 2011.
-
Proc. Usenix HotSec, 2011
-
-
Cai, L.1
Chen, H.2
-
5
-
-
84893294002
-
Crossover: Secure and usable user interface for mobile devices with multiple isolated os personalities
-
ACM
-
M. Lange and S. Liebergeld. Crossover: secure and usable user interface for mobile devices with multiple isolated os personalities. In Proc. ACSAC, pages 249-257. ACM, 2013.
-
(2013)
Proc. ACSAC
, pp. 249-257
-
-
Lange, M.1
Liebergeld, S.2
-
7
-
-
84881187703
-
Screen-pass: Secure password entry on touchscreen devices
-
D. Liu, E. Cuervo, V. Pistol, R. Scudellari, and L. P. Cox. Screen-pass: Secure password entry on touchscreen devices. In Proc. MobiSys, 2013.
-
Proc. MobiSys, 2013
-
-
Liu, D.1
Cuervo, E.2
Pistol, V.3
Scudellari, R.4
Cox, L.P.5
-
8
-
-
85077134302
-
Cloud terminal: Secure access to sensitive applications from untrusted systems
-
L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica. Cloud terminal: secure access to sensitive applications from untrusted systems. In Proc. USENIX ATC, 2012.
-
Proc. USENIX ATC, 2012
-
-
Martignoni, L.1
Poosankam, P.2
Zaharia, M.3
Han, J.4
McCamant, S.5
Song, D.6
Paxson, V.7
Perrig, A.8
Shenker, S.9
Stoica, I.10
-
9
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
ACM
-
J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for tcb minimization. In OS Review, volume 42, pages 315-328. ACM, 2008.
-
(2008)
OS Review
, vol.42
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
10
-
-
78650861686
-
Safe passage for passwords and other sensitive data
-
J. M. McCune, A. Perrig, and M. K. Reiter. Safe passage for passwords and other sensitive data. In NDSS, 2009.
-
(2009)
NDSS
-
-
McCune, J.M.1
Perrig, A.2
Reiter, M.K.3
-
11
-
-
84906870352
-
-
Microsoft Jan
-
Microsoft. How interactive logon works. http://technet.microsoft.com/en- us/library/cc780332 (v=ws.10).aspx, Jan 2009.
-
(2009)
How Interactive Logon Works
-
-
-
12
-
-
84897768729
-
Using arm trust-zone to build a trusted language runtime for mobile applications
-
ACM
-
N. Santos, H. Raj, S. Saroiu, and A. Wolman. Using arm trust-zone to build a trusted language runtime for mobile applications. In Proc. ASPLOS. ACM, 2014.
-
(2014)
Proc. ASPLOS
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
14
-
-
84914115732
-
The peril of fragmentation: Security hazards in android device driver customizations
-
X. Zhou, Y. Lee, N. Zhang, M. Naveed, and X. Wang. The peril of fragmentation: Security hazards in android device driver customizations. In IEEE Symposium on Security and Privacy, 2014.
-
IEEE Symposium on Security and Privacy, 2014
-
-
Zhou, X.1
Lee, Y.2
Zhang, N.3
Naveed, M.4
Wang, X.5
|