2017 International Conference on ReConFigurable Computing and FPGAs (ReConFig) 2017
DOI: 10.1109/reconfig.2017.8279826
|View full text |Cite
|
Sign up to set email alerts
|

Trusted display and input using screen overlays

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…While many works study how to use a hypervisor to build a trusted path to users (e.g. [60][61][62][63][64]), little work has been done in the trusted hardware setting. SGXIO [16] provides a hybrid solution that combines SGX with hypervisor techniques to allow a trusted I/O path with unmodified devices.…”
Section: Discussion and Extensionsmentioning
confidence: 99%
“…While many works study how to use a hypervisor to build a trusted path to users (e.g. [60][61][62][63][64]), little work has been done in the trusted hardware setting. SGXIO [16] provides a hybrid solution that combines SGX with hypervisor techniques to allow a trusted I/O path with unmodified devices.…”
Section: Discussion and Extensionsmentioning
confidence: 99%
“…Bump in the Wire-based Solutions Fidelius [ECB + 19], ProtectIOn [DUKC20], Inte-griScreen [SUD + 20], FPGA-based overlays [BT17], IntegriKey [DYKC17] are some of the trusted path solutions that use external trusted hardware devices as intermediaries between the platform and IO devices. These external devices create a trusted path between a remote user and the peripheral and enable the user to exchange sensitive data securely with the peripheral in the presence of an attacker-controlled OS.…”
Section: Related Work Tee-based Solutionsmentioning
confidence: 99%
“…This is due to the usage of PIN codes for enabling access to sensitive information. Indeed, such a mechanism is vulnerable to several attacks (eg, side channel, phishing, shoulder surfing, and video‐recording attacks) and, thus, it can be easily bypassed . Therefore, the traditional PIN authentication mechanism is unreliable for security‐sensitive operations (eg, payment using Samsung Pay, Apple Pay, and Google Pay) on smartwatches.…”
Section: Introductionmentioning
confidence: 99%