Login / Signup
Cloaking Malware with the Trusted Platform Module.
Alan M. Dunn
Owen S. Hofmann
Brent Waters
Emmett Witchel
Published in:
USENIX Security Symposium (2011)
Keyphrases
</>
trusted platform module
trusted computing
location privacy
privacy protection
location based services
reverse engineering
computing platform
mobile devices
cloud computing
location information
cost effective
remote attestation