Protecting Data on Smartphones and Tablets from Memory Attacks.
Patrick ColpJiawen ZhangJames GleesonSahil SunejaEyal de LaraHimanshu RajStefan SaroiuAlec WolmanPublished in: ASPLOS (2015)
Keyphrases
- data sets
- data collection
- high quality
- data points
- synthetic data
- database
- data analysis
- mobile devices
- image data
- digital images
- training data
- computational power
- data distribution
- desktop computers
- limited memory
- privacy preservation
- incoming data
- personal data
- data transfer
- countermeasures
- high dimensional data
- data processing
- input data
- data mining techniques
- data sources
- xml documents
- data structure
- databases