Modern mobile platforms from a security perspective
暂无分享,去创建一个
[1] Richard Kissel,et al. Glossary of Key Information Security Terms , 2014 .
[2] Michael Shaulov,et al. Practical Attacks against Mobile Device Management ( MDM ) Solutions , 2013 .
[3] Michael Howard,et al. Measuring Relative Attack Surfaces , 2005 .
[4] Federico Mancini,et al. Ephemeral classification of mobile terminals , 2015, 2015 International Conference on Military Communications and Information Systems (ICMCIS).
[5] Tilo Müller,et al. FROST - Forensic Recovery of Scrambled Telephones , 2013, ACNS.
[6] Nikolay Elenkov. Android Security Internals: An In-Depth Guide to Android's Security Architecture , 2014 .
[7] Transcoding Functions,et al. Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; , 2009 .
[8] Dominic Chell,et al. The Mobile Application Hacker's Handbook: Chell/Mobile , 2014 .
[9] Ralf-Philipp Weinmann,et al. Baseband Attacks: Remote Exploitation of Memory Corruptions in Cellular Protocol Stacks , 2012, WOOT.
[10] Stephen Smalley,et al. Security Enhanced (SE) Android: Bringing Flexible MAC to Android , 2013, NDSS.
[11] T. Alves,et al. TrustZone : Integrated Hardware and Software Security , 2004 .
[12] E. Demko. Commercial-off-the shelf (COTS): a challenge to military equipment reliability , 1996, Proceedings of 1996 Annual Reliability and Maintainability Symposium.
[13] Federico Mancini,et al. Information sharing across security domains , 2015 .