Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware.
Zhihao YaoSeyed Mohammadjavad Seyed TalebiMingyi ChenArdalan Amiri SaniThomas E. AndersonPublished in: MobiSys (2023)
Keyphrases
- trusted computing
- insider attacks
- computer security
- control program
- computing platform
- real time
- computing environments
- random number generator
- intrusion detection
- information security
- low cost
- high level language
- security requirements
- hardware and software
- computing systems
- automatic programming
- security issues
- statistical databases
- daily life
- cloud computing
- mobile applications
- network security
- access control
- mobile devices
- protection scheme
- security policies
- computer programs
- virtual organization
- security protocols
- cryptographic protocols
- data acquisition
- database systems
- hardware designs
- data mining