Cryptographic key protection against FROST for mobile devices
暂无分享,去创建一个
[1] David Annetts. Encryption , 2019, Preview.
[2] Chenxiong Qian,et al. Toward Engineering a Secure Android Ecosystem , 2016, ACM Comput. Surv..
[3] Yuanzhang Li,et al. Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..
[4] Brij B. Gupta,et al. Android Applications Repackaging Detection Techniques for Smartphone Devices , 2016 .
[5] Brij B. Gupta,et al. Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel , 2016 .
[6] Marcus Andersson,et al. Key-hiding on the ARM platform , 2014, Digit. Investig..
[7] Johannes Götzfried,et al. ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices , 2013, 2013 International Conference on Availability, Reliability and Security.
[8] Tilo Müller,et al. On the Practicability of Cold Boot Attacks , 2013, 2013 International Conference on Availability, Reliability and Security.
[9] Andreas Dewald,et al. TRESOR Runs Encryption Securely Outside RAM , 2011, USENIX Security Symposium.
[10] Patrick Simmons,et al. Security through amnesia: a software-based solution to the cold boot attack on disk encryption , 2011, ACSAC '11.
[11] Andreas Dewald,et al. AESSE: a cold-boot resistant implementation of AES , 2010, EUROSEC '10.
[12] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[13] Peter Gutmann,et al. Data Remanence in Semiconductor Devices , 2001, USENIX Security Symposium.
[14] R. Carbone,et al. An In-Depth Analysis of the Cold Boot Attack: Can It Be Used for Sound Forensic Memory Acquisition? , 2011 .