Taming Mr Hayes: Mitigating signaling based attacks on smartphones
暂无分享,去创建一个
Matthias Lange | Jean-Pierre Seifert | Collin Mulliner | Steffen Liebergeld | J. Seifert | Collin Mulliner | Steffen Liebergeld | Matthias Lange | Jean-Pierre Seifert
[1] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[2] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[3] Jeremy Andrus,et al. Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.
[4] Christian Stüble,et al. Towards a Trusted Mobile Desktop , 2010, TRUST.
[5] Nicolai Kuntze,et al. On the Deployment of Mobile Trusted Modules , 2007, 2008 IEEE Wireless Communications and Networking Conference.
[6] Giovanni Vigna,et al. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones , 2006, DIMVA.
[7] Ahmad-Reza Sadeghi,et al. Practical and lightweight domain isolation on Android , 2011, SPSM '11.
[8] Thomas F. La Porta,et al. Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks , 2006, IEEE/ACM Transactions on Networking.
[9] Jean-Pierre Seifert,et al. Rise of the iBots: Owning a telco network , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[10] Jean-Pierre Seifert,et al. SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms , 2010, ICICS.
[11] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[12] Thomas F. La Porta,et al. From mobile phones to responsible devices , 2011, Secur. Commun. Networks.
[13] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[14] Jochen Liedtke,et al. The performance of μ-kernel-based systems , 1997, SOSP.
[15] Gerald J. Popek,et al. Formal requirements for virtualizable third generation architectures , 1974, SOSP '73.
[16] Thomas F. La Porta,et al. On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.
[17] Chun-Kun,et al. Lecture Note Sel4: Formal Verification of an Os Kernel , 2022 .
[18] Vinod Yegneswaran,et al. An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.