2016 12th International Conference on Computational Intelligence and Security (CIS) 2016
DOI: 10.1109/cis.2016.0065
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Secure and Trusted Application Execution on Embedded Devices [33] 2015 Holistic approach to the security and trust of embedded devices A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment [34] 2016…”
Section: General Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Secure and Trusted Application Execution on Embedded Devices [33] 2015 Holistic approach to the security and trust of embedded devices A Novel Method of APK-Based Automated Execution and Traversal with a Trusted Execution Environment [34] 2016…”
Section: General Resultsmentioning
confidence: 99%
“…Content may change prior to final publication. Protection for legacy applications [8] Access control between trusted and untrusted worlds [23] Protection for embedded devices [33] Hardware isolation architecture [41] Protection for applications execution [34] General-purpose trusted computing platform [27] Protection for real-time OS [43] Trusted OS [29] Protection against data leakage [70] Memory dump mechanism [30] Protection for memory integrity [45] Cache-assisted secure execution [39] Protection for legacy applications [48] Runtime security architecture [19] Protection for services [72] Kernel protection mechanism [51] Protection for SoC communication bus [66] TCB measurements management [42] Trusted I/O [74] Hypervisor [57] Secure device access method [26] Secure mobile device framework [54] TABLE 10. Application solution proposals…”
Section: Tee Advantages and Disadvantagesmentioning
confidence: 99%