Regulating Smart Personal Devices in Restricted Spaces
暂无分享,去创建一个
Liviu Iftode | Ahmad-Reza Sadeghi | Vinod Ganapathy | Christopher Liebchen | Daeyoung Kim | Ferdinand Brasser | A. Sadeghi | L. Iftode | V. Ganapathy | Ferdinand Brasser | Daeyoung Kim | C. Liebchen
[1] Alec Wolman,et al. Software abstractions for trusted sensors , 2012, MobiSys '12.
[2] Brian D. Noble,et al. When Virtual Is Better Than Real , 2001 .
[3] Alec Wolman,et al. Using ARM trustzone to build a trusted language runtime for mobile applications , 2014, ASPLOS.
[4] Yuewu Wang,et al. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices , 2015, NDSS.
[5] Edward W. Felten,et al. Lessons from the Sony CD DRM Episode , 2006, USENIX Security Symposium.
[6] Liang Gu,et al. Context-Aware Usage Control for Android , 2010, SecureComm.
[7] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[8] Quan Chen,et al. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World , 2014, CCS.
[9] William A. Arbaugh,et al. Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor , 2004, USENIX Security Symposium.
[10] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[11] Patrick D. McDaniel,et al. Semantically Rich Application-Centric Security in Android , 2009, 2009 Annual Computer Security Applications Conference.
[12] Arati Baliga,et al. Detecting Kernel-Level Rootkits Using Data Structure Invariants , 2011, IEEE Transactions on Dependable and Secure Computing.
[13] Trent Jaeger,et al. Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture , 2014, ArXiv.
[14] Elisa Bertino,et al. GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.
[15] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[16] J. Alex Halderman,et al. Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security , 2014, Financial Cryptography.
[17] Mustaque Ahamad,et al. A context-aware security architecture for emerging applications , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[18] Helen J. Wang,et al. World-Driven Access Control for Continuous Sensing , 2014, CCS.
[19] Arati Baliga,et al. Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.
[20] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[21] Jeremy Andrus,et al. Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.
[22] Shwetak N. Patel,et al. BlindSpot: Creating Capture-Resistant Spaces , 2009, Protecting Privacy in Video Surveillance.
[23] David A. Wagner,et al. How to Ask for Permission , 2012, HotSec.
[24] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[25] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[26] Peter M. Chen,et al. Pocket Hypervisors: Opportunities and Challenges , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.
[27] Apu Kapadia,et al. Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones , 2011, NDSS.
[28] N. Asokan,et al. On-board credentials with open provisioning , 2009, ASIACCS '09.
[29] Norman M. Sadeh,et al. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing , 2012, UbiComp.
[30] Emmett Witchel,et al. Ensuring operating system kernel integrity with OSck , 2011, ASPLOS XVI.
[31] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[32] Ahmad-Reza Sadeghi,et al. ConXsense: automated context classification for context-aware access control , 2013, AsiaCCS.
[33] Susan K. Coulter,et al. Introduction to InfiniBand , 2015 .
[34] Ahmad-Reza Sadeghi,et al. Flexible and Fine-grained Mandatory Access Control on Android for Diverse Security and Privacy Policies , 2013, USENIX Security Symposium.
[35] Jeffrey S. Foster,et al. C‐strider: type‐aware heap traversal for C , 2016, Softw. Pract. Exp..
[36] Golden G. Richard,et al. Acquisition and analysis of volatile memory from android devices , 2012, Digit. Investig..
[37] Brian N. Bershad,et al. Recovering device drivers , 2004, TOCS.
[38] Sushil Jajodia,et al. TrustDump: Reliable Memory Acquisition on Smartphones , 2014, ESORICS.
[39] Ashwin Machanavajjhala,et al. MarkIt: privacy markers for protecting visual secrets , 2014, UbiComp Adjunct.
[40] Arati Baliga,et al. Lurking in the Shadows: Identifying Systemic Threats to Kernel Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[41] Ahmad-Reza Sadeghi,et al. ConXsense – Context Profiling and Classification for Context-Aware Access Control (Best Paper Award) , 2014 .
[42] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[43] David Lie,et al. Hypervisor Support for Identifying Covertly Executing Binaries , 2008, USENIX Security Symposium.
[44] Guofei Gu,et al. A Large-Scale Empirical Study of Conficker , 2012, IEEE Transactions on Information Forensics and Security.
[45] Andri P. Heriyanto,et al. Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones , 2013 .
[46] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[47] Ahmad-Reza Sadeghi,et al. MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones , 2012, NDSS.
[48] Vitaly Shmatikov,et al. A Scanner Darkly: Protecting User Privacy from Perceptual Applications , 2013, 2013 IEEE Symposium on Security and Privacy.
[49] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[50] David J. Crandall,et al. PlaceAvoider: Steering First-Person Cameras away from Sensitive Spaces , 2014, NDSS.
[51] Zhilei Xu,et al. Tracking Rootkit Footprints with a Practical Memory Analysis System , 2012, USENIX Security Symposium.
[52] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[53] Ahmad-Reza Sadeghi,et al. ASM: A Programmable Interface for Extending Android Security , 2014, USENIX Security Symposium.
[54] Jason Nieh,et al. KVM/ARM: the design and implementation of the linux ARM hypervisor , 2014, ASPLOS.
[55] William A. Arbaugh,et al. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.
[56] Alec Wolman,et al. Protecting Data on Smartphones and Tablets from Memory Attacks , 2015, ASPLOS.
[57] Helen J. Wang,et al. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers , 2013, USENIX Security Symposium.
[58] David J. Crandall,et al. PlaceRaider: Virtual Theft in Physical Spaces with Smartphones , 2012, NDSS.
[59] Liviu Iftode,et al. Remote repair of operating system state using Backdoors , 2004, International Conference on Autonomic Computing, 2004. Proceedings..
[60] Tal Garfinkel,et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection , 2003, NDSS.