메뉴 건너뛰기




Volumn , Issue , 2014, Pages 308-312

Multi-tiered security architecture for ARM via the virtualization and security extensions

Author keywords

ARM; introspection; mobile; virtualization

Indexed keywords

ANOMALY DETECTION; ARCHITECTURE; COMMERCE; COMPUTER ARCHITECTURE; EXPERT SYSTEMS; VIRTUALIZATION;

EID: 84919340836     PISSN: 15294188     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DEXA.2014.68     Document Type: Conference Paper
Times cited : (7)

References (28)
  • 1
    • 84919328815 scopus 로고    scopus 로고
    • November 4
    • McAfee Deep Defender. http://www.mcafee.com/us/resources/data-sheet/ds-deep-defender.pdf, November 4 2013.
    • (2013) McAfee Deep Defender
  • 17
    • 81855220945 scopus 로고    scopus 로고
    • A universal semantic bridge for virtual machine introspection
    • Springer
    • C. Schneider, J. Pfoh, and C. Eckert. A universal semantic bridge for virtual machine introspection. In Information Systems Security, pages 370-373. Springer, 2011.
    • (2011) Information Systems Security , pp. 370-373
    • Schneider, C.1    Pfoh, J.2    Eckert, C.3
  • 21
    • 77954726625 scopus 로고    scopus 로고
    • Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture
    • Springer
    • A. Vasudevan, J. M. McCune, N. Qu, L. Van Doorn, and A. Perrig. Requirements for an integrity-protected hypervisor on the x86 hardware virtualized architecture. In Trust and Trustworthy Computing, pages 141-165. Springer, 2010.
    • (2010) Trust and Trustworthy Computing , pp. 141-165
    • Vasudevan, A.1    McCune, J.M.2    Qu, N.3    Van Doorn, L.4    Perrig, A.5
  • 24
    • 70349253246 scopus 로고    scopus 로고
    • Trusted computing building blocks for embedded linux-based arm trustzone platforms
    • ACM
    • J. Winter. Trusted computing building blocks for embedded linux-based arm trustzone platforms. In Proceedings of the 3rd ACM workshop on Scalable trusted computing, pages 21-30. ACM, 2008.
    • (2008) Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing , pp. 21-30
    • Winter, J.1
  • 28
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
    • L. K. Yan and H. Yin. Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In Proceedings of the 21st USENIX Security Symposium, 2012.
    • (2012) Proceedings of the 21st USENIX Security Symposium
    • Yan, L.K.1    Yin, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.