Login / Signup
Protecting Data on Smartphones and Tablets from Memory Attacks.
Patrick Colp
Jiawen Zhang
James Gleeson
Sahil Suneja
Eyal de Lara
Himanshu Raj
Stefan Saroiu
Alec Wolman
Published in:
ASPLOS (2015)
Keyphrases
</>
data sets
data collection
high quality
data points
synthetic data
database
data analysis
mobile devices
image data
digital images
training data
computational power
data distribution
desktop computers
limited memory
privacy preservation
incoming data
personal data
data transfer
countermeasures
high dimensional data
data processing
input data
data mining techniques
data sources
xml documents
data structure
databases