-
1
-
-
84883020601
-
Security architecture for device encryption and VPN
-
Alkassar, A., Scheibel, M., Stübel, M., Sadeghi, A.-R., Winandy, M., Security architecture for device encryption and VPN. ISSE 2006 – securing electronic busines processes, Vieweg, 2006, 54–63.
-
(2006)
ISSE 2006 – securing electronic busines processes, Vieweg
, pp. 54-63
-
-
Alkassar, A.1
Scheibel, M.2
Stübel, M.3
Sadeghi, A.-R.4
Winandy, M.5
-
2
-
-
82655162792
-
Cells: a virtual Mobile smartphone architecture
-
Andrus, J., Dall, C., Hof, A.V., Laadan, O., Nieh, J., Cells: a virtual Mobile smartphone architecture. Proceedings of the 23rd ACM symposium on operating systems principles, SOSP ‘11, ACM, New York, NY, USA, 2011, 173–187.
-
(2011)
Proceedings of the 23rd ACM symposium on operating systems principles, SOSP ‘11, ACM, New York, NY, USA
, pp. 173-187
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
3
-
-
21644433634
-
Xen and the art of virtualization
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., et al. Xen and the art of virtualization. SIGOPS Oper Syst Rev 37:5 (2003), 164–177 http://doi.acm.org/10.1145/1165389.945462.
-
(2003)
SIGOPS Oper Syst Rev
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
-
4
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
Barrera, D., Kayacik, H.G., van Oorschot, P.C., Somayaji, A., A methodology for empirical analysis of permission-based security models and its application to android. Proceedings of the 17th ACM conference on computer and communications security, CCS ‘10, ACM, New York, NY, USA, 2010, 73–84.
-
(2010)
Proceedings of the 17th ACM conference on computer and communications security, CCS ‘10, ACM, New York, NY, USA
, pp. 73-84
-
-
Barrera, D.1
Kayacik, H.G.2
van Oorschot, P.C.3
Somayaji, A.4
-
5
-
-
80755127062
-
Practical and lightweight domain isolation on Android
-
Bugiel, S., Davi, L., Dmitrienko, A., Heuser, S., Sadeghi, A.-R., Shastry, B., Practical and lightweight domain isolation on Android. Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, SPSM ‘11, ACM, New York, NY, USA, 2011, 51–62.
-
(2011)
Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, SPSM ‘11, ACM, New York, NY, USA
, pp. 51-62
-
-
Bugiel, S.1
Davi, L.2
Dmitrienko, A.3
Heuser, S.4
Sadeghi, A.-R.5
Shastry, B.6
-
6
-
-
85047891952
-
Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies
-
Bugiel, S., Heuser, S., Sadeghi, A.-R., Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. Presented as part of the 22nd USENIX security symposium (USENIX security 13), USENIX, Washington, D.C, 2013, 131–146 https://www.usenix.org/conference/usenixsecurity13/technical-sessions/presentation/bugiel.
-
(2013)
Presented as part of the 22nd USENIX security symposium (USENIX security 13), USENIX, Washington, D.C
, pp. 131-146
-
-
Bugiel, S.1
Heuser, S.2
Sadeghi, A.-R.3
-
7
-
-
80755182885
-
Going “beyond a faster horse” to transform mobile devices. Tech. rep
-
Carlson, B., Going “beyond a faster horse” to transform mobile devices. Tech. rep. 2011.
-
(2011)
-
-
Carlson, B.1
-
8
-
-
85037073388
-
Privilege escalation attacks on Android
-
Davi, L., Dmitrienko, A., Sadeghi, A.-R., Winandy, M., Privilege escalation attacks on Android. Proceedings of the 13th international conference on information security, ISC’10, Springer-Verlag, Berlin, Heidelberg, 2011, 346–360.
-
(2011)
Proceedings of the 13th international conference on information security, ISC’10, Springer-Verlag, Berlin, Heidelberg
, pp. 346-360
-
-
Davi, L.1
Dmitrienko, A.2
Sadeghi, A.-R.3
Winandy, M.4
-
9
-
-
21644455412
-
Terra: a virtual machine-based platform for trusted computing
-
Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D., Terra: a virtual machine-based platform for trusted computing. Proceedings of the 19th ACM symposium on operating systems principles, SOSP ‘03, ACM, New York, NY, USA, 2003, 193–206.
-
(2003)
Proceedings of the 19th ACM symposium on operating systems principles, SOSP ‘03, ACM, New York, NY, USA
, pp. 193-206
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
10
-
-
33947691568
-
The nizza secure-system architecture
-
Härtig, H., Hohmuth, M., Feske, N., Helmuth, C., Lackorzynski, A., Mehnert, F., et al. The nizza secure-system architecture. International conference on collaborative computing: networking, applications and worksharing, 2005.
-
(2005)
International conference on collaborative computing: networking, applications and worksharing
-
-
Härtig, H.1
Hohmuth, M.2
Feske, N.3
Helmuth, C.4
Lackorzynski, A.5
Mehnert, F.6
-
11
-
-
51949098506
-
Xen on ARM: system virtualization using Xen hypervisor for ARM-based secure Mobile phones
-
Hwang, J.-Y., Suh, S.-B., Heo, S.-K., Park, C.-J., Ryu, J.-M., Park, S.-Y., et al. Xen on ARM: system virtualization using Xen hypervisor for ARM-based secure Mobile phones. 5th IEEE consumer communications and networking conference, CCNC ‘08, 2008, 257–261.
-
(2008)
5th IEEE consumer communications and networking conference, CCNC ‘08
, pp. 257-261
-
-
Hwang, J.-Y.1
Suh, S.-B.2
Heo, S.-K.3
Park, C.-J.4
Ryu, J.-M.5
Park, S.-Y.6
-
12
-
-
80755143400
-
L4Android: a generic operating system framework for secure smartphones
-
Lange, M., Liebergeld, S., Lackorzynski, A., Warg, A., Peter, M., L4Android: a generic operating system framework for secure smartphones. Proceedings of the 1st ACM workshop on security and privacy in smartphones and Mobile devices, SPSM ‘11, ACM, New York, NY, USA, 2011, 39–50.
-
(2011)
Proceedings of the 1st ACM workshop on security and privacy in smartphones and Mobile devices, SPSM ‘11, ACM, New York, NY, USA
, pp. 39-50
-
-
Lange, M.1
Liebergeld, S.2
Lackorzynski, A.3
Warg, A.4
Peter, M.5
-
13
-
-
84983220552
-
Xen-Cap: a capability framework for Xen
-
Tech. rep.
-
Naik, Y., Xen-Cap: a capability framework for Xen. Tech. rep., 2013.
-
(2013)
-
-
Naik, Y.1
-
14
-
-
78751555807
-
Porscha: policy oriented secure content handling in Android
-
Ongtang, M., Butler, K., McDaniel, P., Porscha: policy oriented secure content handling in Android. Proceedings of the 26th annual computer security applications conference, ACSAC ‘10, ACM, New York, NY, USA, 2010, 221–230.
-
(2010)
Proceedings of the 26th annual computer security applications conference, ACSAC ‘10, ACM, New York, NY, USA
, pp. 221-230
-
-
Ongtang, M.1
Butler, K.2
McDaniel, P.3
-
15
-
-
84950106082
-
Performance overhead of KVM on Linux 3.9 on ARM Cortex-A15
-
ACM
-
Rasmusson, L., Corcoran, D., Performance overhead of KVM on Linux 3.9 on ARM Cortex-A15. 2014, ACM.
-
(2014)
-
-
Rasmusson, L.1
Corcoran, D.2
-
16
-
-
84864062248
-
Moses: supporting operation modes on smartphones
-
Russello, G., Conti, M., Crispo, B., Fernandes, E., Moses: supporting operation modes on smartphones. Proceedings of the 17th ACM symposium on access control models and technologies, SACMAT ‘12, ACM, New York, NY, USA, 2012, 3–12 http://doi.acm.org/10.1145/2295136.2295140.
-
(2012)
Proceedings of the 17th ACM symposium on access control models and technologies, SACMAT ‘12, ACM, New York, NY, USA
, pp. 3-12
-
-
Russello, G.1
Conti, M.2
Crispo, B.3
Fernandes, E.4
-
17
-
-
77950673302
-
Securing android-powered mobile devices using SELinux
-
Shabtai, A., Fledel, Y., Elovici, Y., Securing android-powered mobile devices using SELinux. IEEE Secur Priv 8:3 (2010), 36–44.
-
(2010)
IEEE Secur Priv
, vol.8
, Issue.3
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
18
-
-
85084160641
-
The flask security architecture: system support for diverse security policies
-
Spencer, R., Smalley, S., Loscocco, P., Loscocco, P., Hibler, M., Lepreau, J., et al. The flask security architecture: system support for diverse security policies. Proceedings of the eighth USENIX security symposium, 1999, 123–139.
-
(1999)
Proceedings of the eighth USENIX security symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Loscocco, P.4
Hibler, M.5
Lepreau, J.6
-
19
-
-
85084164351
-
Linux security modules: general security support for the Linux kernel
-
Wright, C., Cowan, C., Smalley, S., Morris, J., Kroah-Hartman, G., Linux security modules: general security support for the Linux kernel. Proceedings of the 11th USENIX security symposium, USENIX association, Berkeley, CA, USA, 2002, 17–31.
-
(2002)
Proceedings of the 11th USENIX security symposium, USENIX association, Berkeley, CA, USA
, pp. 17-31
-
-
Wright, C.1
Cowan, C.2
Smalley, S.3
Morris, J.4
Kroah-Hartman, G.5
-
20
-
-
79959568144
-
A trusted mobile phone reference architecture via secure kernel
-
Zhang, X., Aciicmez, O., Seifert, J.-P., A trusted mobile phone reference architecture via secure kernel. Proceedings of the 2007 ACM workshop on scalable trusted computing, STC ‘07, ACM, New York, NY, USA, 2007, 7–14.
-
(2007)
Proceedings of the 2007 ACM workshop on scalable trusted computing, STC ‘07, ACM, New York, NY, USA
, pp. 7-14
-
-
Zhang, X.1
Aciicmez, O.2
Seifert, J.-P.3
|