BootStomp: On the Security of Bootloaders in Mobile Devices.
Nilo RediniAravind MachiryDipanjan DasYanick FratantonioAntonio BianchiEric GustafsonYan ShoshitaishviliChristopher KruegelGiovanni VignaPublished in: USENIX Security Symposium (2017)
Keyphrases
- mobile devices
- mobile phone
- mobile commerce
- context aware
- intrusion detection
- security issues
- information security
- access control
- mobile applications
- security analysis
- mobile technologies
- statistical databases
- mobile internet
- computing devices
- computer security
- mobile learning
- network security
- mobile computing environment
- information assurance
- key management
- functional requirements
- security requirements
- smart phones
- ubiquitous computing
- mobile users
- location based services
- security level
- embedded devices
- security management
- intrusion detection system
- communication technologies
- security measures
- security policies