TIVOs : Trusted Visual I / O Paths for Android
暂无分享,去创建一个
[1] Robert N. M. Watson,et al. Exploiting Concurrency Vulnerabilities in System Call Wrappers , 2007, WOOT.
[2] Tianhao Tong. GuarDroid : A Trusted Path for Password Entry , 2013 .
[3] Zhi Xu,et al. Abusing Notification Services on Smartphones for Phishing and Spamming , 2012, WOOT.
[4] Stuart E. Schechter,et al. The Emperor's New Security Indicators , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[5] Min Wu,et al. Do security toolbars actually prevent phishing attacks? , 2006, CHI.
[6] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[7] Landon P. Cox,et al. ScreenPass: secure password entry on touchscreen devices , 2013, MobiSys '13.
[8] Rui Wang,et al. Unauthorized origin crossing on mobile platforms: threats and mitigation , 2013, CCS.
[9] Jeffrey Picciotto,et al. Compartmented Mode Workstation: Prototype Highlights , 1990, IEEE Trans. Software Eng..
[10] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[11] Adrienne Porter Felt,et al. Alice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness , 2013, USENIX Security Symposium.
[12] Marti A. Hearst,et al. Why phishing works , 2006, CHI.
[13] Norman Feske,et al. A Nitpickers guide to a minimal-complexity secure GUI , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[14] Jörg Schwenk,et al. UI Redressing Attacks on Android Devices , 2012 .
[15] Zhuoqing Morley Mao,et al. Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks , 2014, USENIX Security Symposium.
[16] Matthias Lange,et al. Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities , 2013, ACSAC.
[17] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[18] Helen J. Wang,et al. Clickjacking: Attacks and Defenses , 2012, USENIX Security Symposium.
[19] J. Doug Tygar,et al. The battle against phishing: Dynamic Security Skins , 2005, SOUPS '05.
[20] James Newsome,et al. Building Verifiable Trusted Path on Commodity x86 Computers , 2012, 2012 IEEE Symposium on Security and Privacy.
[21] Hongyang Li,et al. Screenmilker: How to Milk Your Android Screen for Secrets , 2014, NDSS.
[22] A. Porter. Phishing on Mobile Devices , 2011 .