-
1
-
-
51849104627
-
Trustzone: Integrated hardware and software security
-
Alves, T. (2004): Trustzone: Integrated hardware and software security. White Paper.
-
(2004)
White Paper
-
-
Alves, T.1
-
2
-
-
84858765455
-
-
ARM
-
ARM (2010): Cortex-a9 technical reference manual. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0388f/DDI0388F-cortex-a9-r2p2-trm.pdf.
-
(2010)
Cortex-a9 Technical Reference Manual
-
-
-
3
-
-
84910673981
-
Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world
-
Azab, A. M.; Ning, P.; Shah, J.; Chen, Q. (2014): Hypervision across worlds: Real-time kernel protection from the arm trustzone secure world. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 90-102.
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 90-102
-
-
Azab, A.M.1
Ning, P.2
Shah, J.3
Chen, Q.4
-
4
-
-
84945177387
-
What the app is that? Deception and countermeasures in the android user interface
-
Bianchi, A.; Corbetta, J.; Invernizzi, L.; Fratantonio, Y. (2015): What the app is that? Deception and countermeasures in the android user interface. Security and Privacy, pp. 931-948.
-
(2015)
Security and Privacy
, pp. 931-948
-
-
Bianchi, A.1
Corbetta, J.2
Invernizzi, L.3
Fratantonio, Y.4
-
5
-
-
85047891807
-
Peeking into your app without actually seeing it: Ui state inference and novel android attacks
-
Chen, Q.; Qian, Z.; Mao, Z. (2014): Peeking into your app without actually seeing it: Ui state inference and novel android attacks. USENIX Security Symposium, pp. 1037-1052.
-
(2014)
USENIX Security Symposium
, pp. 1037-1052
-
-
Chen, Q.1
Qian, Z.2
Mao, Z.3
-
6
-
-
77957810674
-
Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
-
Chen, X.; Garfinkel, T.; Lewis, E. C.; Subrahmanyam, P. (2008): Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Operating Systems Review, vol. 42, no. 2, pp. 2-13.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, Issue.2
, pp. 2-13
-
-
Chen, X.1
Garfinkel, T.2
Lewis, E.C.3
Subrahmanyam, P.4
-
8
-
-
84906502672
-
Appshield: Protecting applications against untrusted operating system
-
Cheng, Y.; Ding, X.; Deng, R. (2013): Appshield: Protecting applications against untrusted operating system. Singapore Management University Technical Report, SMU-SIS-13, vol. 101.
-
(2013)
Singapore Management University Technical Report, SMU-SIS-13
, vol.101
-
-
Cheng, Y.1
Ding, X.2
Deng, R.3
-
9
-
-
85026657375
-
Hardware-assisted on-demand hyper-visor activation for efficient security critical code execution on mobile devices
-
Cho, Y.; Shin, J. B.; Kwon, D.; Ham, M. (2016): Hardware-assisted on-demand hyper-visor activation for efficient security critical code execution on mobile devices. USENIX Annual Technical Conference, pp. 565-578.
-
(2016)
USENIX Annual Technical Conference
, pp. 565-578
-
-
Cho, Y.1
Shin, J.B.2
Kwon, D.3
Ham, M.4
-
10
-
-
84969353312
-
Graphical user interface for virtualized mobile handsets
-
Danisevskis, J.; Peter, M.; Nordholz, J.; Petschick, M.; Vetter, J. (2015): Graphical user interface for virtualized mobile handsets. IEEE S&P MoST.
-
(2015)
IEEE S&P MoST
-
-
Danisevskis, J.1
Peter, M.2
Nordholz, J.3
Petschick, M.4
Vetter, J.5
-
12
-
-
70349240080
-
Ether: Malware analysis via hard-ware virtualization extensions
-
Dinaburg, A.; Royal, P.; Sharif, M.; Lee, W. (2008): Ether: Malware analysis via hard-ware virtualization extensions. Proceedings of the 15th ACM conference on Computer and Communications Security, pp. 51-62.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 51-62
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
14
-
-
0026281520
-
A prototype b3 trusted x window system
-
Epstein, J.; McHugh, J.; Pascale, R.; Orman, H. (1991): A prototype b3 trusted x window system. Computer Security Applications Conference, pp. 44-55.
-
(1991)
Computer Security Applications Conference
, pp. 44-55
-
-
Epstein, J.1
McHugh, J.2
Pascale, R.3
Orman, H.4
-
16
-
-
85026209717
-
Trustshadow: Secure execution of unmodified applications with arm trustzone
-
Guan, L.; Liu, P.; Xing, X.; Ge, X.; Zhang, S. et al. (2017): Trustshadow: Secure execution of unmodified applications with arm trustzone. Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, pp. 488-501.
-
(2017)
Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services
, pp. 488-501
-
-
Guan, L.1
Liu, P.2
Xing, X.3
Ge, X.4
Zhang, S.5
-
17
-
-
62349096287
-
Screen oriented technique for reducing the incidence of shoulder surfing
-
Hoanca, B.; Mock, K. J. (2005): Screen oriented technique for reducing the incidence of shoulder surfing. Security and Management, pp. 334-340.
-
(2005)
Security and Management
, pp. 334-340
-
-
Hoanca, B.1
Mock, K.J.2
-
18
-
-
84987628667
-
Automatic generation of data-oriented exploits
-
Hu, H.; Chua, Z. L.; Adrian, S.; Saxena, P.; Liang, Z. (2015): Automatic generation of data-oriented exploits. USENIX Security Symposium, pp. 177-192.
-
(2015)
USENIX Security Symposium
, pp. 177-192
-
-
Hu, H.1
Chua, Z.L.2
Adrian, S.3
Saxena, P.4
Liang, Z.5
-
19
-
-
84987597669
-
Data-oriented programming: On the expressiveness of non-control data attacks
-
Hu, H.; Shinde, S.; Adrian, S.; Chua, Z. L. (2016): Data-oriented programming: On the expressiveness of non-control data attacks. Security and Privacy, pp. 969-986.
-
(2016)
Security and Privacy
, pp. 969-986
-
-
Hu, H.1
Shinde, S.2
Adrian, S.3
Chua, Z.L.4
-
20
-
-
85043474272
-
A services routing based caching scheme for cloud assisted crns
-
Huang, M.; Liu, Y.; Zhang, N.; Xiong, N.; Liu, A. et al. (2018): A services routing based caching scheme for cloud assisted crns. IEEE Access.
-
(2018)
IEEE Access
-
-
Huang, M.1
Liu, Y.2
Zhang, N.3
Xiong, N.4
Liu, A.5
-
22
-
-
77954614533
-
Defeating return-oriented rootkits with return-less kernels
-
Li, J.; Wang, Z.; Jiang, X.; Grace, M.; Bahram, S. (2010): Defeating return-oriented rootkits with return-less kernels. Proceedings of the 5th European conference on Computer Systems, pp. 195-208.
-
(2010)
Proceedings of the 5th European Conference on Computer Systems
, pp. 195-208
-
-
Li, J.1
Wang, Z.2
Jiang, X.3
Grace, M.4
Bahram, S.5
-
23
-
-
85044437790
-
Llmp: Exploiting lldp for latency measurement in software-defined data center networks
-
Li, Y.; Cai, Z.; Xu, H. (2018): Llmp: Exploiting lldp for latency measurement in software-defined data center networks. Journal of Computer Science and Technology, vol. 33, no. 2, pp. 277-285.
-
(2018)
Journal of Computer Science and Technology
, vol.33
, Issue.2
, pp. 277-285
-
-
Li, Y.1
Cai, Z.2
Xu, H.3
-
24
-
-
84951766822
-
Screenmilker: How to milk your android screen for secrets
-
Lin, C. C.; Li, H.; Zhou, X. Y.; Wang, X. (2014): Screenmilker: How to milk your android screen for secrets. NDSS.
-
(2014)
NDSS
-
-
Lin, C.C.1
Li, H.2
Zhou, X.Y.3
Wang, X.4
-
25
-
-
84855404052
-
Hypervisor support for identifying covertly executing binaries
-
Litty, L.; Lagar Cavilla, H. A.; Lie, D. (2008): Hypervisor support for identifying covertly executing binaries. USENIX Security Symposium, pp. 243-258.
-
(2008)
USENIX Security Symposium
, pp. 243-258
-
-
Litty, L.1
Lagar Cavilla, H.A.2
Lie, D.3
-
26
-
-
85042125055
-
A clustering-anonymity privacy-preserving method for wearable iot devices
-
Liu, F.; Li, T. (2018): A clustering-anonymity privacy-preserving method for wearable iot devices. Security and Communication Networks.
-
(2018)
Security and Communication Networks
-
-
Liu, F.1
Li, T.2
-
28
-
-
77955186544
-
Trustvisor: Efficient tcb reduction and attestation
-
McCune, J. M.; Li, Y.; Qu, N.; Zhou, Z. (2010): Trustvisor: Efficient tcb reduction and attestation. 2010 IEEE Symposium on Security and Privacy, pp. 143-158.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 143-158
-
-
McCune, J.M.1
Li, Y.2
Qu, N.3
Zhou, Z.4
-
29
-
-
77952132371
-
Flicker: An execution infrastructure for tcb minimization
-
McCune, J. M.; Parno, B. J.; Perrig, A.; Reiter, M. K.; Isozaki, H. (2008): Flicker: An execution infrastructure for tcb minimization. ACM SIGOPS Operating Systems Review, vol. 42, pp. 315-328.
-
(2008)
ACM SIGOPS Operating Systems Review
, vol.42
, pp. 315-328
-
-
McCune, J.M.1
Parno, B.J.2
Perrig, A.3
Reiter, M.K.4
Isozaki, H.5
-
30
-
-
84864372370
-
Tapprints: Your finger taps have fingerprints
-
Miluzzo, E.; Varshavsky, A.; Balakrishnan, S.; Choudhury, R. R. (2012): Tapprints: Your finger taps have fingerprints. Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services, pp. 323-336.
-
(2012)
Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services
, pp. 323-336
-
-
Miluzzo, E.1
Varshavsky, A.2
Balakrishnan, S.3
Choudhury, R.R.4
-
32
-
-
85036653271
-
High security identity tags using spiral resonators
-
Pradeep, A.; Mridula, S.; Mohanan, P. (2016): High security identity tags using spiral resonators. Computers, Materials & Continua, vol. 52, no. 3, pp. 185-195.
-
(2016)
Computers, Materials & Continua
, vol.52
, Issue.3
, pp. 185-195
-
-
Pradeep, A.1
Mridula, S.2
Mohanan, P.3
-
36
-
-
85030787105
-
Tinyvisor: An extensible secure framework on android platforms
-
Shen, D.; Li, Z.; Su, X.; Ma, J.; Deng, R. (2018): Tinyvisor: An extensible secure framework on android platforms. Computers & Security, vol. 72, pp. 145-162.
-
(2018)
Computers & Security
, vol.72
, pp. 145-162
-
-
Shen, D.1
Li, Z.2
Su, X.3
Ma, J.4
Deng, R.5
-
41
-
-
84950138855
-
Trustice: Hardware-assisted isolated computing environments on mobile devices
-
Sun, H.; Sun, K.; Wang, Y.; Jing, J.; Wang, H. (2015): Trustice: Hardware-assisted isolated computing environments on mobile devices. Dependable Systems and Networks, pp. 367-378.
-
(2015)
Dependable Systems and Networks
, pp. 367-378
-
-
Sun, H.1
Sun, K.2
Wang, Y.3
Jing, J.4
Wang, H.5
-
42
-
-
85045520335
-
Security and privacy in the medical internet of things
-
Sun, W.; Cai, Z.; Li, Y.; Liu, F.; Fang, S. et al. (2018): Security and privacy in the medical internet of things. Security and Communication Networks.
-
(2018)
Security and Communication Networks
-
-
Sun, W.1
Cai, Z.2
Li, Y.3
Liu, F.4
Fang, S.5
-
43
-
-
85042787741
-
A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks
-
Tang, J.; Liu, A.; Zhang, J.; Xiong, N. N.; Zeng, Z. et al. (2018): A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors, vol. 18, no. 3, pp. 751.
-
(2018)
Sensors
, vol.18
, Issue.3
, pp. 751
-
-
Tang, J.1
Liu, A.2
Zhang, J.3
Xiong, N.N.4
Zeng, Z.5
-
44
-
-
85031702914
-
Im-visor: A pre-ime guard to prevent ime apps from stealing sensitive keystrokes using trustzone
-
Tian, C.; Wang, Y.; Liu, P.; Zhou, Q.; Zhang, C. et al. (2017): Im-visor: A pre-ime guard to prevent ime apps from stealing sensitive keystrokes using trustzone. 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 145-156.
-
(2017)
2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
, pp. 145-156
-
-
Tian, C.1
Wang, Y.2
Liu, P.3
Zhou, Q.4
Zhang, C.5
-
46
-
-
85007468031
-
Secpod: A framework for virtualization-based security systems
-
Wang, X.; Chen, Y.; Wang, Z.; Qi, Y.; Zhou, Y. (2015): Secpod: A framework for virtualization-based security systems. USENIX Annual Technical Conference, pp. 347-360.
-
(2015)
USENIX Annual Technical Conference
, pp. 347-360
-
-
Wang, X.1
Chen, Y.2
Wang, Z.3
Qi, Y.4
Zhou, Y.5
-
47
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Wang, Z.; Jiang, X.; Cui, W.; Ning, P. (2009): Countering kernel rootkits with lightweight hook protection. Proceedings of the 16th ACM conference on Computer and communications security, pp. 545-554.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 545-554
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
49
-
-
85044452035
-
An active defense solution for arp spoofing in openflow network
-
Xia, J.; Cai, Z.; Xu, M. (2018): An active defense solution for arp spoofing in openflow network. Chinese Journal of Electronics.
-
(2018)
Chinese Journal of Electronics
-
-
Xia, J.1
Cai, Z.2
Xu, M.3
-
51
-
-
2942744785
-
Secure information display with limited viewing zone by use of multi-color visual cryptography
-
Yamamoto, H.; Hayasaki, Y.; Nishida, N. (2004): Secure information display with limited viewing zone by use of multi-color visual cryptography. Optics Express, vol. 12, no. 7, pp. 1258-1270.
-
(2004)
Optics Express
, vol.12
, Issue.7
, pp. 1258-1270
-
-
Yamamoto, H.1
Hayasaki, Y.2
Nishida, N.3
-
53
-
-
85040104001
-
Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis
-
Yuan, C.; Li, X.; Wu, Q.; Li, J.; Sun, X. (2017): Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Computers, Materials & Continua, vol. 53, no. 3, pp. 357-371.
-
(2017)
Computers, Materials & Continua
, vol.53
, Issue.3
, pp. 357-371
-
-
Yuan, C.1
Li, X.2
Wu, Q.3
Li, J.4
Sun, X.5
-
54
-
-
85045523370
-
A survey on security-aware measurement in SDN
-
Zhang, H.; Cai, Z.; Liu, Q.; Xiao, Q.; Li, Y. et al. (2018): A survey on security-aware measurement in sdn. Security and Communication Networks.
-
(2018)
Security and Communication Networks
-
-
Zhang, H.1
Cai, Z.2
Liu, Q.3
Xiao, Q.4
Li, Y.5
-
55
-
-
84878350874
-
Building verifiable trusted path on commodity x86 computers
-
Zhou, Z.; Gligor, V. D.; Newsome, J.; McCune, J. M. (2012): Building verifiable trusted path on commodity x86 computers. Security and Privacy, pp. 616-630.
-
(2012)
Security and Privacy
, pp. 616-630
-
-
Zhou, Z.1
Gligor, V.D.2
Newsome, J.3
McCune, J.M.4
-
56
-
-
84914102853
-
Dancing with giants: Wimpy kernels for on-demand isolated I/O
-
Zhou, Z.; Yu, M.; Gligor, V. D. (2014): Dancing with giants: Wimpy kernels for on-demand isolated I/O. Security and Privacy, pp. 308-323.
-
(2014)
Security and Privacy
, pp. 308-323
-
-
Zhou, Z.1
Yu, M.2
Gligor, V.D.3
|