-
1
-
-
84897982645
-
-
AMD Virtualization. http://www.amd.com/en-us/solutions/servers/virtualization.
-
AMD Virtualization
-
-
-
2
-
-
84970879526
-
-
Android OATH Token. https://code:google.com/p/androidtoken/.
-
Android OATH Token
-
-
-
3
-
-
84893263730
-
-
Antutu Benchmark. http://www.antutu.com/en/Ranking:shtml.
-
Antutu Benchmark
-
-
-
4
-
-
84970879531
-
-
ARM. http://www.arm.com/.
-
ARM
-
-
-
6
-
-
84970907811
-
-
DIGIPASS GO 6. https://www.vasco.com/products/client-products/single-button-digipass/digipass-go6.aspx.
-
DIGIPASS GO 6
-
-
-
7
-
-
84954136314
-
-
Juno ARM Development Platform. http://www.arm.com/products/tools/development- boards/versatile-express/juno-arm-development- platform:php.
-
Juno ARM Development Platform
-
-
-
9
-
-
84903606597
-
-
Phi phenomenon. http://en.wikipedia.org/wiki/Phi-phenomenon.
-
Phi Phenomenon
-
-
-
10
-
-
84970872906
-
-
RFC1760. https://tools.ietf.org/html/rfc1760.
-
RFC1760
-
-
-
11
-
-
84970879565
-
-
RFC2289. https://tools.ietf.org/html/rfc2289.
-
RFC2289
-
-
-
12
-
-
84970907827
-
-
RFC4226. https://tools.ietf.org/html/rfc4226.
-
RFC4226
-
-
-
13
-
-
84970879784
-
-
RFC6238. https://tools.ietf.org/html/rfc6238.
-
RFC6238
-
-
-
15
-
-
51849104627
-
Trustzone: Integrated hardware and software security
-
T. Alves and D. Felton. Trustzone: Integrated hardware and software security. ARM white paper, 3(4), 2004.
-
(2004)
ARM White Paper
, vol.3
, pp. 4
-
-
Alves, T.1
Felton, D.2
-
16
-
-
84887475095
-
Instrumenting android and Java applications as easy as abc
-
Rennes, France, September 24-27,. Proceedings
-
S. Arzt, S. Rasthofer, and E. Bodden. Instrumenting android and java applications as easy as abc. In Runtime Verification - 4th International Conference, RV 2013, Rennes, France, September 24-27, 2013. Proceedings, pages 364-381.
-
(2013)
Runtime Verification - 4th International Conference, RV 2013
, pp. 364-381
-
-
Arzt, S.1
Rasthofer, S.2
Bodden, E.3
-
17
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the ARM trustzone secure world
-
Scottsdale, AZ, USA, November 3-7
-
A. M. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. Hypervision across worlds: Real-time kernel protection from the ARM trustzone secure world. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014, pages 90-102.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 90-102
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
18
-
-
77954714208
-
M-shield mobile security technology: Making wireless secure
-
J. Azema and G. Fayad. M-shield mobile security technology: making wireless secure. Texas Instruments Whitepaper, 2008.
-
(2008)
Texas Instruments Whitepaper
-
-
Azema, J.1
Fayad, G.2
-
20
-
-
84897759668
-
KVM/ARM: The design and implementation of the linux ARM hypervisor
-
Salt Lake City, UT, USA, March 1-5
-
C. Dall and J. Nieh. KVM/ARM: the design and implementation of the linux ARM hypervisor. In Architectural Support for Programming Languages and Operating Systems, ASPLOS '14, Salt Lake City, UT, USA, March 1-5, 2014, pages 333-348.
-
(2014)
Architectural Support for Programming Languages and Operating Systems, ASPLOS '14
, pp. 333-348
-
-
Dall, C.1
Nieh, J.2
-
21
-
-
84962573807
-
Security analysis of mobile two-factor authentication schemes
-
A. Dmitrienko, C. Liebchen, C. Rossow, and A. Sadeghi. Security analysis of mobile two-factor authentication schemes. Intel Technology Journal, 18(4), 2014.
-
Intel Technology Journal
, vol.18
, Issue.4
, pp. 2014
-
-
Dmitrienko, A.1
Liebchen, C.2
Rossow, C.3
Sadeghi, A.4
-
23
-
-
84889070358
-
Trusted execution environments on mobile devices
-
Berlin, Germany, November 4-8
-
J. Ekberg, K. Kostiainen, and N. Asokan. Trusted execution environments on mobile devices. In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013, pages 1497-1498.
-
(2013)
2013 ACM SIGSAC Conference on Computer and Communications Security, CCS'13
, pp. 1497-1498
-
-
Ekberg, J.1
Kostiainen, K.2
Asokan, N.3
-
26
-
-
84970886049
-
-
Fortinet. FortiToken. http://www.fortinet.com/products/fortitoken/index:html.
-
FortiToken
-
-
Fortinet1
-
29
-
-
84950106250
-
-
Freescale. i.MX53 Processors. http://www.freescale.com/webapp/sps/site/taxonomy:jsp?code=IMX53-FAMILY.
-
I.MX53 Processors
-
-
Freescale1
-
33
-
-
84950126617
-
-
Giesecke & Devrient. MobiCore. http://www.gi-de.com/en/trends-and-insights/mobicore/trusted-mobile-services:jsp.
-
MobiCore
-
-
Giesecke & Devrient1
-
37
-
-
85128201272
-
Ssecret: Secure channel between rich execution environment and trusted execution environment
-
San Diego, California, USA, February 8-11
-
J. Jang, S. Kong, M. Kim, D. Kim, and B. B. Kang. Ssecret: Secure channel between rich execution environment and trusted execution environment. In 21st Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8-11, 2015.
-
(2015)
21st Annual Network and Distributed System Security Symposium, NDSS 2015
-
-
Jang, J.1
Kong, S.2
Kim, M.3
Kim, D.4
Kang, B.B.5
-
40
-
-
74049088382
-
On-board credentials with open provisioning
-
Sydney, Australia, March 10-12
-
K. Kostiainen, J. Ekberg, N. Asokan, and A. Rantala. On-board credentials with open provisioning. In Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pages 104-115.
-
(2009)
Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009
, pp. 104-115
-
-
Kostiainen, K.1
Ekberg, J.2
Asokan, N.3
Rantala, A.4
-
41
-
-
84954195489
-
Adattester: Secure online mobile advertisement attestation using trustzone
-
Florence, Italy, May 19-22
-
W. Li, H. Li, H. Chen, and Y. Xia. Adattester: Secure online mobile advertisement attestation using trustzone. In Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2015, Florence, Italy, May 19-22, 2015, pages 75-88.
-
(2015)
Proceedings of the 13th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2015
, pp. 75-88
-
-
Li, W.1
Li, H.2
Chen, H.3
Xia, Y.4
-
42
-
-
84951766822
-
Screenmilker: How to milk your android screen for secrets
-
San Diego, California, USA, February
-
C. Lin, H. Li, X. Zhou, and X. Wang. Screenmilker: How to milk your android screen for secrets. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014.
-
(2014)
21st Annual Network and Distributed System Security Symposium, NDSS 2014
, pp. 23-26
-
-
Lin, C.1
Li, H.2
Zhou, X.3
Wang, X.4
-
43
-
-
85133408027
-
Smartphones as practical and secure location verification tokens for payments
-
San Diego, California, USA, February
-
C. Marforio, N. Karapanos, C. Soriente, K. Kostiainen, and S. Capkun. Smartphones as practical and secure location verification tokens for payments. In 21st Annual Network and Distributed System Security Symposium, NDSS 2014, San Diego, California, USA, February 23-26, 2014.
-
(2014)
21st Annual Network and Distributed System Security Symposium, NDSS 2014
, pp. 23-26
-
-
Marforio, C.1
Karapanos, N.2
Soriente, C.3
Kostiainen, K.4
Capkun, S.5
-
49
-
-
84897768729
-
Using ARM trustzone to build a trusted language runtime for mobile applications
-
Salt Lake City, UT, USA, March 1-5
-
N. Santos, H. Raj, S. Saroiu, and A. Wolman. Using ARM trustzone to build a trusted language runtime for mobile applications. In Architectural Support for Programming Languages and Operating Systems, ASPLOS '14, Salt Lake City, UT, USA, March 1-5, 2014, pages 67-80.
-
(2014)
Architectural Support for Programming Languages and Operating Systems, ASPLOS '14
, pp. 67-80
-
-
Santos, N.1
Raj, H.2
Saroiu, S.3
Wolman, A.4
-
50
-
-
84970881222
-
-
SolidPass. Desktop soft token. http://www.solidpass.com/authentication-methods/one- time-password-generator-otp-token:html.
-
Desktop Soft Token
-
-
SolidPass1
-
51
-
-
84906505419
-
Trustdump: Reliable memory acquisition on smartphones
-
Wroclaw, Poland, September 7-11,. Proceedings
-
H. Sun, K. Sun, Y. Wang, J. Jing, and S. Jajodia. Trustdump: Reliable memory acquisition on smartphones. In Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I, pages 202-218.
-
(2014)
Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security
, pp. 202-218
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
Jajodia, S.5
-
54
-
-
20344391930
-
Intel virtualization technology
-
R. Uhlig, G. Neiger, D. Rodgers, A. L. Santoni, F. C. Martins, A. V. Anderson, S. M. Bennett, A. Kagi, F. H. Leung, and L. Smith. Intel Virtualization Technology. Computer, 38(5):48-56, 2005.
-
(2005)
Computer
, vol.38
, Issue.5
, pp. 48-56
-
-
Uhlig, R.1
Neiger, G.2
Rodgers, D.3
Santoni, A.L.4
Martins, F.C.5
Anderson, A.V.6
Bennett, S.M.7
Kagi, A.8
Leung, F.H.9
Smith, L.10
-
55
-
-
84868113525
-
Experimenting with ARM trustzone - Or: How i met friendly piece of trusted hardware
-
Liverpool, United Kingdom, June 25-27
-
J. Winter. Experimenting with ARM trustzone - or: How I met friendly piece of trusted hardware. In 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012, pages 1161-1166.
-
(2012)
11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012
, pp. 1161-1166
-
-
Winter, J.1
-
56
-
-
84865698195
-
A exible software development and emulation framework for arm trustzone
-
J. Winter, P. Wiegele, M. Pirker, and R. Tögl. A exible software development and emulation framework for arm trustzone. In INTRUST, pages 1-15. 2011.
-
(2011)
INTRUST
, pp. 1-15
-
-
Winter, J.1
Wiegele, P.2
Pirker, M.3
Tögl, R.4
-
57
-
-
84855824009
-
Android platform based linux kernel rootkit
-
Fajardo, Puerto Rico, USA, October 18-19
-
D. You and B. Noh. Android platform based linux kernel rootkit. In 6th International Conference on Malicious and Unwanted Software, MALWARE 2011, Fajardo, Puerto Rico, USA, October 18-19, 2011, pages 79-87.
-
(2011)
6th International Conference on Malicious and Unwanted Software, MALWARE 2011
, pp. 79-87
-
-
You, D.1
Noh, B.2
|