-
5
-
-
84979892777
-
Cheating concerns force delay in SAT scores for South Koreans and Chinese
-
October 30
-
N. Anderson and V. Strauss. Cheating concerns force delay in SAT scores for South Koreans and Chinese. In Washington Post, October 30, 2014.
-
(2014)
Washington Post
-
-
Anderson, N.1
Strauss, V.2
-
6
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh. Cells: A virtual mobile smartphone architecture. In ACM Symposium on Operating Systems Principles, 2011.
-
(2011)
ACM Symposium on Operating Systems Principles
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
7
-
-
84905110394
-
Mobile trusted computing
-
August
-
N. Asokan, J-E. Ekberg, K. Kostiainen, A. Rajan, C. Rozas, A.-R. Sadeghi, S. Schulz, and C. Wachsmann. Mobile trusted computing. Proceedings of the IEEE, 102(8), August 2014.
-
(2014)
Proceedings of the IEEE
, vol.102
, pp. 8
-
-
Asokan, N.1
Ekberg, J.-E.2
Kostiainen, K.3
Rajan, A.4
Rozas, C.5
Sadeghi, A.-R.6
Schulz, S.7
Wachsmann, C.8
-
9
-
-
84910673981
-
Hypervision across Worlds: Real-time kernel protection from the ARM TrustZone secure world
-
A. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. Hypervision across Worlds: Real-time kernel protection from the ARM TrustZone secure world. In ACM Conference on Computer and Communications Security, 2014.
-
(2014)
ACM Conference on Computer and Communications Security
-
-
Azab, A.1
Ning, P.2
Shah, J.3
Chen, Q.4
Bhutkar, R.5
Ganesh, G.6
Ma, J.7
Shen, W.8
-
10
-
-
79960552201
-
Detecting kernel-level rootkits using data structure invariants
-
A. Baliga, V. Ganapathy, and L. Iftode. Detecting kernel-level rootkits using data structure invariants. IEEE Transactions on Dependable and Secure Computing, 8(5), 2011.
-
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.5
, pp. 2011
-
-
Baliga, A.1
Ganapathy, V.2
Iftode, L.3
-
12
-
-
84860764042
-
MockDroid: Trading privacy for application functionality on smartphones
-
A. Beresford, A. Rice, N. Skehin, and R. Sohan. MockDroid: Trading privacy for application functionality on smartphones. In ACM HotMobile, 2010.
-
(2010)
ACM HotMobile
-
-
Beresford, A.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
14
-
-
4544366279
-
Remote repair of operating system state using backdoors
-
A. Bohra, I. Neamtiu, P. Gallard, F. Sultan, and L. Iftode. Remote repair of operating system state using backdoors. In International Conference on Autonomic Computing, 2004.
-
(2004)
International Conference on Autonomic Computing
-
-
Bohra, A.1
Neamtiu, I.2
Gallard, P.3
Sultan, F.4
Iftode, L.5
-
15
-
-
85047891952
-
Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies
-
S. Bugiel, S. Hauser, and A.-R. Sadeghi. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. In USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Bugiel, S.1
Hauser, S.2
Sadeghi, A.-R.3
-
16
-
-
74049158180
-
Mapping kernel objects to enable systematic integrity checking
-
M. Carbone, W. Cui, L. Lu, W. Lee, M. Peinado, and X. Jiang. Mapping kernel objects to enable systematic integrity checking. In ACM Conference on Computer and Communications Security, 2009.
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Carbone, M.1
Cui, W.2
Lu, L.3
Lee, W.4
Peinado, M.5
Jiang, X.6
-
17
-
-
84881218966
-
SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
-
J. Clark and P. C. van Oorschot. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In IEEE Symposium on Security & Privacy, 2013.
-
(2013)
IEEE Symposium on Security & Privacy
-
-
Clark, J.1
Van Oorschot, P.C.2
-
18
-
-
84939190257
-
Protecting data on smartphones and tablets from memory attacks
-
P. Colp, J. Zhang, J. Gleeson, S. Suneja, E. Lara, H. Raj, S. Saroiu, and A. Wolman. Protecting data on smartphones and tablets from memory attacks. In ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2015.
-
(2015)
ACM International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Colp, P.1
Zhang, J.2
Gleeson, J.3
Suneja, S.4
Lara, E.5
Raj, H.6
Saroiu, S.7
Wolman, A.8
-
20
-
-
46449104590
-
Pocket hypervisors: Opportunities and challenges
-
L. P. Cox and P. M. Chen. Pocket hypervisors: Opportunities and challenges. In ACM HotMobile, 2007.
-
(2007)
ACM HotMobile
-
-
Cox, L.P.1
Chen, P.M.2
-
23
-
-
84901629830
-
MoCFI: Mitigating control-flow attacks on smartphones
-
L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger, and A.-R. Sadeghi. MoCFI: Mitigating control-flow attacks on smartphones. In Network & Distributed Systems Security Symposium, 2012.
-
(2012)
Network & Distributed Systems Security Symposium
-
-
Davi, L.1
Dmitrienko, A.2
Egele, M.3
Fischer, T.4
Holz, T.5
Hund, R.6
Nurnberger, S.7
Sadeghi, A.-R.8
-
25
-
-
84960880797
-
-
Google
-
Google. Using DDMS for debugging. http://developer.android.com/tools/debugging/ddms.html.
-
Using DDMS for debugging
-
-
-
26
-
-
84917741115
-
Procedures and tools for acquisition and analysis of volatile memory on Android smartphones
-
A. P. Heriyanto. Procedures and tools for acquisition and analysis of volatile memory on Android smartphones. In 11th Australian Digital Forensics Conference, 2013.
-
(2013)
11th Australian Digital Forensics Conference
-
-
Heriyanto, A.P.1
-
28
-
-
79953070187
-
Ensuring operating system kernel integrity with OSck
-
O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel. Ensuring operating system kernel integrity with OSck. In ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2011.
-
(2011)
ACM International Conference on Architectural Support for Programming Languages and Operating Systems
-
-
Hofmann, O.S.1
Dunn, A.M.2
Kim, S.3
Roy, I.4
Witchel, E.5
-
29
-
-
84979867534
-
-
September
-
Mellanox Technologies Inc. Introduction to InfiniBand, September 2014. http://www.mellanox.com/blog/2014/09/introduction-to-infiniband.
-
(2014)
Introduction to InfiniBand
-
-
-
30
-
-
84910668443
-
Enabling fine-grained permissions for augmented reality applications with recognizers
-
S. Jana, D. Molnar, A. Moshchuk, A. Dunn, B. Livshits, H. J. Wang, and E. Ofek. Enabling fine-grained permissions for augmented reality applications with recognizers. In USENIX Security Symposium, 2013.
-
(2013)
USENIX Security Symposium
-
-
Jana, S.1
Molnar, D.2
Moshchuk, A.3
Dunn, A.4
Livshits, B.5
Wang, H.J.6
Ofek, E.7
-
31
-
-
84910611140
-
ATRA: Address translation redirection attack against hardware-based external monitors
-
D. Jang, H. Lee, M. Kim, D. Kim, D. Kim, and B. Kang. ATRA: Address translation redirection attack against hardware-based external monitors. In ACM Conference on Computer and Communications Security, 2014.
-
ACM Conference on Computer and Communications Security
, vol.2014
-
-
Jang, D.1
Lee, H.2
Kim, M.3
Kim, D.4
Kim, D.5
Kang, B.6
-
32
-
-
74049088382
-
On-board credentials with open provisioning
-
K. Kostiainen, J. Ekberg, N. Asokan, and A. Rantala. On-board credentials with open provisioning. In ACM Symposium on Information, Computer and Communications Security, 2009.
-
(2009)
ACM Symposium on Information, Computer and Communications Security
-
-
Kostiainen, K.1
Ekberg, J.2
Asokan, N.3
Rantala, A.4
-
33
-
-
85026245708
-
AdAttester: Secure online advertisement attestation on mobile devices using TrustZone
-
W. Li, H. Li, H. Chen, and Y. Xia. AdAttester: Secure online advertisement attestation on mobile devices using TrustZone. In ACM MobiSys, 2015.
-
(2015)
ACM MobiSys
-
-
Li, W.1
Li, H.2
Chen, H.3
Xia, Y.4
-
36
-
-
84979952022
-
New website tracks "Glasshole-Free Zones," businesses that have banned Google Glass
-
March
-
M. McGee. New website tracks "Glasshole-Free Zones," businesses that have banned Google Glass. In Glass Alamanac (http://glassalmanac.com), March 2014.
-
(2014)
Glass Alamanac
-
-
McGee, M.1
-
38
-
-
84984889445
-
ConXsense - Context profiling and classification for context-aware access control
-
M. Miettinen, S. Heuser, W. Kronz, A.-R. Sadeghi, and N. Asokan. ConXsense - Context profiling and classification for context-aware access control. In ACM Symposium on Information, Computer and Communications Security, 2014.
-
(2014)
ACM Symposium on Information, Computer and Communications Security
-
-
Miettinen, M.1
Heuser, S.2
Kronz, W.3
Sadeghi, A.-R.4
Asokan, N.5
-
42
-
-
84991799247
-
An architecture for specification-based detection of semantic integrity violations in kernel dynamic data
-
N. Petroni, T. Fraser, A.Walters, and W. A. Arbaugh. An architecture for specification-based detection of semantic integrity violations in kernel dynamic data. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Petroni, N.1
Fraser, T.2
Walters, A.3
Arbaugh, W.A.4
-
45
-
-
84979945606
-
-
November Microsoft Research Technical Report
-
H. Raj, S. Saroiu, A. Wolman, R. Aigner, J. Cox, P. England, C. Fenner, K. Kinshumann, J. Loeser, D. Mattoon, M. Nystrom, D. Robinson, R. Spiger, S. Thom, and D. Wooten. fTPM: A firmware-based TPM 2.0 implementation, November 2015. Microsoft Research Technical Report 2015-84.
-
(2015)
FTPM: A firmware-based TPM 2.0 implementation
, pp. 2015-2084
-
-
Raj, H.1
Saroiu, S.2
Wolman, A.3
Aigner, R.4
Cox, J.5
England, P.6
Fenner, C.7
Kinshumann, K.8
Loeser, J.9
Mattoon, D.10
Nystrom, M.11
Robinson, D.12
Spiger, R.13
Thom, S.14
Wooten, D.15
-
47
-
-
84908689805
-
MarkIt: Privacy markers for protecting visual secrets
-
N. Raval, A. Srivastava, K. Lebeck, L. P. Cox, and A. Machanavajjhala. MarkIt: Privacy markers for protecting visual secrets. In ACM International Joint Conference on Pervasive and Ubiquitous Computing UPSIDE Workshop, 2014.
-
(2014)
ACM International Joint Conference on Pervasive and Ubiquitous Computing UPSIDE Workshop
-
-
Raval, N.1
Srivastava, A.2
Lebeck, K.3
Cox, L.P.4
Machanavajjhala, A.5
-
48
-
-
84910623331
-
World-driven access control for continuous sensing
-
F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. In ACM Conference on Computer and Communications Security, 2014.
-
(2014)
ACM Conference on Computer and Communications Security
-
-
Roesner, F.1
Molnar, D.2
Moshchuk, A.3
Kohno, T.4
Wang, H.J.5
-
51
-
-
84979903767
-
-
Samsung
-
Samsung. KNOX workspace supported MDMs. https://www.samsungknox.com/en/products/knox-workspace/technical/knox-mdm-feature-list.
-
KNOX workspace supported MDMs
-
-
-
57
-
-
84970906764
-
TrustDump: Reliable memory acquisition on smartphones
-
H. Sun, K. Sun, Y. Wang, J. Jing, and S. Jajodia. TrustDump: Reliable memory acquisition on smartphones. In European Symposium on Research in Computer Security, 2014.
-
(2014)
European Symposium on Research in Computer Security
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
Jajodia, S.5
-
58
-
-
33847256887
-
Recovering device drivers
-
M. M. Swift, M. Annamalai, B. N. Bershad, and H. N. Levy. Recovering device drivers. ACM Transactions on Computer Systems, 24(4), 2006.
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, pp. 4
-
-
Swift, M.M.1
Annamalai, M.2
Bershad, B.N.3
Levy, H.N.4
-
59
-
-
84857917909
-
Acquisition and analysis of volatile memory from Android smartphones
-
J. Sylve, A. Case, L. Marziale, and G. G. Richard. Acquisition and analysis of volatile memory from Android smartphones. Digital Investigation, 8(3-4), 2012.
-
(2012)
Digital Investigation
, vol.8
, pp. 3-4
-
-
Sylve, J.1
Case, A.2
Marziale, L.3
Richard, G.G.4
-
61
-
-
84978036312
-
CacheKit: Evading memory introspection using cache incoherence
-
N. Zhang, H. Sun, K. Sun, W. Lou, and Y. T. Hou. CacheKit: Evading memory introspection using cache incoherence. In IEEE European Symposium on Security and Privacy, 2016.
-
(2016)
IEEE European Symposium on Security and Privacy
-
-
Zhang, N.1
Sun, H.2
Sun, K.3
Lou, W.4
Hou, Y.T.5
|