최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Getmobile : mobile computing & communications review, v.22 no.3, 2019년, pp.17 - 22
Li, Wenhao (Shaghai Jiao Tong University, Shanghai Shi, China) , Xia, Yubin (Shaghai Jiao Tong University, Shanghai Shi, China) , Chen, Haibo (Shaghai Jiao Tong University, Shanghai Shi, China)
ARM TrustZone [1] is a hardware-based security feature that can provide software with a high-privilege and isolated execution environment. Such isolation is ensured by hardware, which is usually considered as more trustworthy than software. Thus the execution environment is also known as trusted exe...
TrustZone: Integrated hardware and software security. ARM white paper 3, 4 Alves Tiago 2004 Tiago Alves and Don Felton . 2004. TrustZone: Integrated hardware and software security. ARM white paper 3, 4 ( 2004 ), 18--24. Tiago Alves and Don Felton. 2004. TrustZone: Integrated hardware and software security. ARM white paper 3, 4 (2004), 18--24.
Enforcing kernel code integrity on the trustzone architecture." MOST Ge Xinyang 2014 Xinyang Ge , Hayawardh Vijayakumar , and Trent Jaeger . Sprobes : " Enforcing kernel code integrity on the trustzone architecture." MOST , 2014 . Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger. Sprobes: "Enforcing kernel code integrity on the trustzone architecture." MOST, 2014.
Jang, Jinsoo, Choi, Changho, Lee, Jaehyuk, Kwak, Nohyun, Lee, Seongman, Choi, Yeseul, Kang, Brent Byunghoon. PrivateZone: Providing a Private Execution Environment Using ARM TrustZone. IEEE transactions on dependable and secure computing, vol.15, no.5, 797-810.
fTPM: "A software-only implementation of a TPM chip." USENIX Security Symposium 2016 Raj, Himanshu, fTPM: "A software-only implementation of a TPM chip." USENIX Security Symposium . 2016 . Raj, Himanshu, et al. fTPM: "A software-only implementation of a TPM chip." USENIX Security Symposium. 2016.
Binyu Zang and Haibing Guan. vTZ: "Virtualizing ARM trustzone." Usenix Security Symposium Hua Zhichao 2017 Zhichao Hua , Jinyu Gu , Yubin Xia , Haibo Chen , Binyu Zang and Haibing Guan. vTZ: "Virtualizing ARM trustzone." Usenix Security Symposium , 2017 . Zhichao Hua, Jinyu Gu, Yubin Xia, Haibo Chen, Binyu Zang and Haibing Guan. vTZ: "Virtualizing ARM trustzone." Usenix Security Symposium, 2017.
Christopher Kruegel, and Giovanni Vigna. "BOOMERANG: Exploiting the semantic gap in trusted execution environments." NDSS Machiry Aravind 2017 Aravind Machiry , Eric Gustafson , Chad Spensky , Chris Salls , Nick Stephens , Ruoyu Wang , Antonio Bianchi , Yung Ryn Choe , Christopher Kruegel, and Giovanni Vigna. "BOOMERANG: Exploiting the semantic gap in trusted execution environments." NDSS , 2017 . Aravind Machiry, Eric Gustafson, Chad Spensky, Chris Salls, Nick Stephens, Ruoyu Wang, Antonio Bianchi, Yung Ryn Choe, Christopher Kruegel, and Giovanni Vigna. "BOOMERANG: Exploiting the semantic gap in trusted execution environments." NDSS, 2017.
ARMageddon: Cache attacks on mobile devices." USENIX Security Symposium 2016 Lipp, Moritz, " ARMageddon: Cache attacks on mobile devices." USENIX Security Symposium , 2016 . Lipp, Moritz, et al. "ARMageddon: Cache attacks on mobile devices." USENIX Security Symposium, 2016.
Halderman, J. Alex, Schoen, Seth D., Heninger, Nadia, Clarkson, William, Paul, William, Calandrino, Joseph A., Feldman, Ariel J., Appelbaum, Jacob, Felten, Edward W.. Lest we remember : cold-boot attacks on encryption keys. Communications of the ACM, vol.52, no.5, 91-98.
Case: Cache-assisted secure execution on arm processors." Security and Privacy (SP) 2016 Zhang, Ning, " Case: Cache-assisted secure execution on arm processors." Security and Privacy (SP) , 2016 . Zhang, Ning, et al. "Case: Cache-assisted secure execution on arm processors." Security and Privacy (SP), 2016.
Intercede Inc. MyTAM https://www.intercede. com/news/intercedes-mytam-enables-enhancedtrust- for-android-apps-to-protect-against-hackersand- malware. Intercede Inc. MyTAM https://www.intercede. com/news/intercedes-mytam-enables-enhancedtrust- for-android-apps-to-protect-against-hackersand- malware.
ARM Inc. OTrP https://www.electronicsweekly. com/news/arm-aims-to-build-trust-in-iotsecurity- 2016-07. ARM Inc. OTrP https://www.electronicsweekly. com/news/arm-aims-to-build-trust-in-iotsecurity- 2016-07.
해당 논문의 주제분야에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.