Virtualization Techniques for Mobile Systems
暂无分享,去创建一个
[1] Stefan Berger,et al. Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[2] Gernot Heiser,et al. Virtualizing embedded systems - why bother? , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).
[3] Johannes Winter,et al. Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.
[4] Karsten Schwan,et al. VStore: efficiently storing virtualized state across mobile devices , 2008, MobiVirt '08.
[5] Mohammad Nauman,et al. How secure is your smartphone: An analysis of smartphone security mechanisms , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).
[6] Katrin Hoeper,et al. Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors , 2011, SPSM '11.
[7] Adam Lackorzynski,et al. Taming subsystems: capabilities as universal resource access control in L4 , 2009, IIES '09.
[8] Andrew Warfield,et al. Xen and the art of virtualization , 2003, SOSP '03.
[9] Jeremy Andrus,et al. Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.
[10] David Jaramillo,et al. Mobile innovation applications for the BYOD enterprise user , 2013, IBM J. Res. Dev..
[11] Ahmad-Reza Sadeghi,et al. Practical and lightweight domain isolation on Android , 2011, SPSM '11.
[12] Ankur Agarwal,et al. A secure extensible container for hybrid mobile applications , 2013, 2013 Proceedings of IEEE Southeastcon.
[13] Stuart E. Madnick,et al. Application and analysis of the virtual machine approach to information system security and isolation , 1973, Workshop on Virtual Computer Systems.
[14] Samir Tata,et al. Mobile Service Micro-containers for Cloud Environments , 2012, 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[15] Martin Botteck,et al. Virtualization as an enabler for security in mobile devices , 2008, IIES '08.
[16] Jean-Pierre Seifert,et al. A trusted mobile phone reference architecturevia secure kernel , 2007, STC '07.
[17] David Jaramillo,et al. Cooperative solutions for Bring Your Own Device (BYOD) , 2013, IBM J. Res. Dev..
[18] Larry Rudolph. A Virtualization Infrastructure that Supports Pervasive Computing , 2009, IEEE Pervasive Computing.
[19] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[20] Ankur Agarwal,et al. Virtualization Techniques for Mobile Devices , 2013 .
[21] Peter M. Chen,et al. Pocket Hypervisors: Opportunities and Challenges , 2007 .
[22] Harvey Tuch,et al. The VMware mobile virtualization platform: is that a hypervisor in your pocket? , 2010, OPSR.
[23] Jong-Deok Choi,et al. Fine-grained I/O access control based on xen virtualization for 3G/4G mobile devices , 2010, Design Automation Conference.
[24] Mache Creeger. ACM CTO roundtable on mobile devices in the enterprise , 2011, CACM.
[25] Dong Xuan,et al. DiffUser: Differentiated user access control on smartphones , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[26] David Jaramillo,et al. Cross-platform, secure message delivery for mobile devices , 2013, 2013 Proceedings of IEEE Southeastcon.
[27] Rahul Ramasubramanian. Exploring Virtualization Platforms for ARM based Mobile Android Devices. , 2011 .
[28] Jason Nieh,et al. Guest Editors' Introduction: Virtual Machines , 2009, IEEE Pervasive Comput..
[29] Matthias Lange,et al. L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.
[30] Sarah Allen,et al. Pro Smartphone Cross-Platform Development , 2010 .