Cryptographic key protection against FROST for mobile devices

[1]  David Annetts Encryption , 2019, Preview.

[2]  Chenxiong Qian,et al.  Toward Engineering a Secure Android Ecosystem , 2016, ACM Comput. Surv..

[3]  Yuanzhang Li,et al.  Determining image base of firmware for ARM devices by matching literal pools , 2016, Digit. Investig..

[4]  Brij B. Gupta,et al.  Android Applications Repackaging Detection Techniques for Smartphone Devices , 2016 .

[5]  Brij B. Gupta,et al.  Multi-layer Defense Against Malware Attacks on Smartphone Wi-Fi Access Channel , 2016 .

[6]  Marcus Andersson,et al.  Key-hiding on the ARM platform , 2014, Digit. Investig..

[7]  Johannes Götzfried,et al.  ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices , 2013, 2013 International Conference on Availability, Reliability and Security.

[8]  Tilo Müller,et al.  On the Practicability of Cold Boot Attacks , 2013, 2013 International Conference on Availability, Reliability and Security.

[9]  Andreas Dewald,et al.  TRESOR Runs Encryption Securely Outside RAM , 2011, USENIX Security Symposium.

[10]  Patrick Simmons,et al.  Security through amnesia: a software-based solution to the cold boot attack on disk encryption , 2011, ACSAC '11.

[11]  Andreas Dewald,et al.  AESSE: a cold-boot resistant implementation of AES , 2010, EUROSEC '10.

[12]  Ariel J. Feldman,et al.  Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.

[13]  Peter Gutmann,et al.  Data Remanence in Semiconductor Devices , 2001, USENIX Security Symposium.

[14]  R. Carbone,et al.  An In-Depth Analysis of the Cold Boot Attack: Can It Be Used for Sound Forensic Memory Acquisition? , 2011 .