메뉴 건너뛰기




Volumn 55, Issue 1, 2018, Pages 17-35

Securing display path for security-sensitive applications on mobile devices

Author keywords

Display path; Mobile device; Secure display; Trust anchor; Trusted computing base; Virtualization

Indexed keywords

ARM PROCESSORS; MOBILE DEVICES; MOBILE SECURITY; NETWORK SECURITY; VIRTUALIZATION;

EID: 85046683449     PISSN: 15462218     EISSN: 15462226     Source Type: Journal    
DOI: 10.3970/cmc.2018.055.017     Document Type: Article
Times cited : (68)

References (56)
  • 1
    • 51849104627 scopus 로고    scopus 로고
    • Trustzone: Integrated hardware and software security
    • Alves, T. (2004): Trustzone: Integrated hardware and software security. White Paper.
    • (2004) White Paper
    • Alves, T.1
  • 2
    • 84858765455 scopus 로고    scopus 로고
    • ARM
    • ARM (2010): Cortex-a9 technical reference manual. http://infocenter.arm.com/help/topic/com.arm.doc.ddi0388f/DDI0388F-cortex-a9-r2p2-trm.pdf.
    • (2010) Cortex-a9 Technical Reference Manual
  • 4
    • 84945177387 scopus 로고    scopus 로고
    • What the app is that? Deception and countermeasures in the android user interface
    • Bianchi, A.; Corbetta, J.; Invernizzi, L.; Fratantonio, Y. (2015): What the app is that? Deception and countermeasures in the android user interface. Security and Privacy, pp. 931-948.
    • (2015) Security and Privacy , pp. 931-948
    • Bianchi, A.1    Corbetta, J.2    Invernizzi, L.3    Fratantonio, Y.4
  • 5
    • 85047891807 scopus 로고    scopus 로고
    • Peeking into your app without actually seeing it: Ui state inference and novel android attacks
    • Chen, Q.; Qian, Z.; Mao, Z. (2014): Peeking into your app without actually seeing it: Ui state inference and novel android attacks. USENIX Security Symposium, pp. 1037-1052.
    • (2014) USENIX Security Symposium , pp. 1037-1052
    • Chen, Q.1    Qian, Z.2    Mao, Z.3
  • 6
    • 77957810674 scopus 로고    scopus 로고
    • Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems
    • Chen, X.; Garfinkel, T.; Lewis, E. C.; Subrahmanyam, P. (2008): Overshadow: A virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Operating Systems Review, vol. 42, no. 2, pp. 2-13.
    • (2008) ACM SIGOPS Operating Systems Review , vol.42 , Issue.2 , pp. 2-13
    • Chen, X.1    Garfinkel, T.2    Lewis, E.C.3    Subrahmanyam, P.4
  • 9
    • 85026657375 scopus 로고    scopus 로고
    • Hardware-assisted on-demand hyper-visor activation for efficient security critical code execution on mobile devices
    • Cho, Y.; Shin, J. B.; Kwon, D.; Ham, M. (2016): Hardware-assisted on-demand hyper-visor activation for efficient security critical code execution on mobile devices. USENIX Annual Technical Conference, pp. 565-578.
    • (2016) USENIX Annual Technical Conference , pp. 565-578
    • Cho, Y.1    Shin, J.B.2    Kwon, D.3    Ham, M.4
  • 17
    • 62349096287 scopus 로고    scopus 로고
    • Screen oriented technique for reducing the incidence of shoulder surfing
    • Hoanca, B.; Mock, K. J. (2005): Screen oriented technique for reducing the incidence of shoulder surfing. Security and Management, pp. 334-340.
    • (2005) Security and Management , pp. 334-340
    • Hoanca, B.1    Mock, K.J.2
  • 19
    • 84987597669 scopus 로고    scopus 로고
    • Data-oriented programming: On the expressiveness of non-control data attacks
    • Hu, H.; Shinde, S.; Adrian, S.; Chua, Z. L. (2016): Data-oriented programming: On the expressiveness of non-control data attacks. Security and Privacy, pp. 969-986.
    • (2016) Security and Privacy , pp. 969-986
    • Hu, H.1    Shinde, S.2    Adrian, S.3    Chua, Z.L.4
  • 20
    • 85043474272 scopus 로고    scopus 로고
    • A services routing based caching scheme for cloud assisted crns
    • Huang, M.; Liu, Y.; Zhang, N.; Xiong, N.; Liu, A. et al. (2018): A services routing based caching scheme for cloud assisted crns. IEEE Access.
    • (2018) IEEE Access
    • Huang, M.1    Liu, Y.2    Zhang, N.3    Xiong, N.4    Liu, A.5
  • 23
    • 85044437790 scopus 로고    scopus 로고
    • Llmp: Exploiting lldp for latency measurement in software-defined data center networks
    • Li, Y.; Cai, Z.; Xu, H. (2018): Llmp: Exploiting lldp for latency measurement in software-defined data center networks. Journal of Computer Science and Technology, vol. 33, no. 2, pp. 277-285.
    • (2018) Journal of Computer Science and Technology , vol.33 , Issue.2 , pp. 277-285
    • Li, Y.1    Cai, Z.2    Xu, H.3
  • 24
    • 84951766822 scopus 로고    scopus 로고
    • Screenmilker: How to milk your android screen for secrets
    • Lin, C. C.; Li, H.; Zhou, X. Y.; Wang, X. (2014): Screenmilker: How to milk your android screen for secrets. NDSS.
    • (2014) NDSS
    • Lin, C.C.1    Li, H.2    Zhou, X.Y.3    Wang, X.4
  • 25
    • 84855404052 scopus 로고    scopus 로고
    • Hypervisor support for identifying covertly executing binaries
    • Litty, L.; Lagar Cavilla, H. A.; Lie, D. (2008): Hypervisor support for identifying covertly executing binaries. USENIX Security Symposium, pp. 243-258.
    • (2008) USENIX Security Symposium , pp. 243-258
    • Litty, L.1    Lagar Cavilla, H.A.2    Lie, D.3
  • 26
    • 85042125055 scopus 로고    scopus 로고
    • A clustering-anonymity privacy-preserving method for wearable iot devices
    • Liu, F.; Li, T. (2018): A clustering-anonymity privacy-preserving method for wearable iot devices. Security and Communication Networks.
    • (2018) Security and Communication Networks
    • Liu, F.1    Li, T.2
  • 32
    • 85036653271 scopus 로고    scopus 로고
    • High security identity tags using spiral resonators
    • Pradeep, A.; Mridula, S.; Mohanan, P. (2016): High security identity tags using spiral resonators. Computers, Materials & Continua, vol. 52, no. 3, pp. 185-195.
    • (2016) Computers, Materials & Continua , vol.52 , Issue.3 , pp. 185-195
    • Pradeep, A.1    Mridula, S.2    Mohanan, P.3
  • 35
    • 85047466486 scopus 로고    scopus 로고
    • Glider: A GPU library driver for improved system security
    • Sani, A. A.; Zhong, L.; Wallach, D. S. (2014): Glider: A gpu library driver for improved system security. Operating Systems.
    • (2014) Operating Systems
    • Sani, A.A.1    Zhong, L.2    Wallach, D.S.3
  • 36
    • 85030787105 scopus 로고    scopus 로고
    • Tinyvisor: An extensible secure framework on android platforms
    • Shen, D.; Li, Z.; Su, X.; Ma, J.; Deng, R. (2018): Tinyvisor: An extensible secure framework on android platforms. Computers & Security, vol. 72, pp. 145-162.
    • (2018) Computers & Security , vol.72 , pp. 145-162
    • Shen, D.1    Li, Z.2    Su, X.3    Ma, J.4    Deng, R.5
  • 41
    • 84950138855 scopus 로고    scopus 로고
    • Trustice: Hardware-assisted isolated computing environments on mobile devices
    • Sun, H.; Sun, K.; Wang, Y.; Jing, J.; Wang, H. (2015): Trustice: Hardware-assisted isolated computing environments on mobile devices. Dependable Systems and Networks, pp. 367-378.
    • (2015) Dependable Systems and Networks , pp. 367-378
    • Sun, H.1    Sun, K.2    Wang, Y.3    Jing, J.4    Wang, H.5
  • 43
    • 85042787741 scopus 로고    scopus 로고
    • A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks
    • Tang, J.; Liu, A.; Zhang, J.; Xiong, N. N.; Zeng, Z. et al. (2018): A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks. Sensors, vol. 18, no. 3, pp. 751.
    • (2018) Sensors , vol.18 , Issue.3 , pp. 751
    • Tang, J.1    Liu, A.2    Zhang, J.3    Xiong, N.N.4    Zeng, Z.5
  • 49
    • 85044452035 scopus 로고    scopus 로고
    • An active defense solution for arp spoofing in openflow network
    • Xia, J.; Cai, Z.; Xu, M. (2018): An active defense solution for arp spoofing in openflow network. Chinese Journal of Electronics.
    • (2018) Chinese Journal of Electronics
    • Xia, J.1    Cai, Z.2    Xu, M.3
  • 51
    • 2942744785 scopus 로고    scopus 로고
    • Secure information display with limited viewing zone by use of multi-color visual cryptography
    • Yamamoto, H.; Hayasaki, Y.; Nishida, N. (2004): Secure information display with limited viewing zone by use of multi-color visual cryptography. Optics Express, vol. 12, no. 7, pp. 1258-1270.
    • (2004) Optics Express , vol.12 , Issue.7 , pp. 1258-1270
    • Yamamoto, H.1    Hayasaki, Y.2    Nishida, N.3
  • 53
    • 85040104001 scopus 로고    scopus 로고
    • Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis
    • Yuan, C.; Li, X.; Wu, Q.; Li, J.; Sun, X. (2017): Fingerprint liveness detection from different fingerprint materials using convolutional neural network and principal component analysis. Computers, Materials & Continua, vol. 53, no. 3, pp. 357-371.
    • (2017) Computers, Materials & Continua , vol.53 , Issue.3 , pp. 357-371
    • Yuan, C.1    Li, X.2    Wu, Q.3    Li, J.4    Sun, X.5
  • 55
  • 56
    • 84914102853 scopus 로고    scopus 로고
    • Dancing with giants: Wimpy kernels for on-demand isolated I/O
    • Zhou, Z.; Yu, M.; Gligor, V. D. (2014): Dancing with giants: Wimpy kernels for on-demand isolated I/O. Security and Privacy, pp. 308-323.
    • (2014) Security and Privacy , pp. 308-323
    • Zhou, Z.1    Yu, M.2    Gligor, V.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.