TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ICICS (24. : 2022 : Canterbury) Information and communications security
1. Verfasser: Song, Liantao (VerfasserIn)
Weitere Verfasser: Ding, Yan (VerfasserIn), Dong, Pan (VerfasserIn), Guo, Yong (VerfasserIn), Wang, Chuang (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
BS: Blockwise Sieve Algorithm for Finding Short Vectors from Sublattices 2022 Cao, Jinzheng
Improving Deep Learning Based Password Guessing Models Using Pre-processing 2022 Wu, Yuxuan
Lightweight and Practical Privacy-Preserving Image Masking in Smart Community 2022 Liu, Zhen
Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks 2022 Han, Yang
FuzzBoost: Reinforcement Compiler Fuzzing 2022 Li, Xiaoting
TZ-IMA: Supporting Integrity Measurement for Applications with ARM TrustZone 2022 Song, Liantao
Deep Learning Based Webshell Detection Coping with Long Text and Lexical Ambiguity 2022 An, Tongjian
Semi-supervised Context Discovery for Peer-Based Anomaly Detection in Multi-layer Networks 2022 Dong, Bo
Dependency-Based Link Prediction for Learning Microsegmentation Policy 2022 Noel, Steven
Chuchotage: In-line Software Network Protocol Translation for (D)TLS Pegah 2022 Bideh, Nikbakht
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation 2022 Oiu, Zhi
Conditional Cube Attacks on Full Members of KNOT-AEAD Family 2022 Chen, Siwei
Autoencoder Assist: An Efficient Profiling Attack on High-Dimensional Datasets 2022 Lei, Qi
DeepC2: AI-Powered Covert Command and Control on OSNS 2022 Wang, Zhi
Malware Detection with Limited Supervised Information via Contrastive Learning on API Call Sequences 2022 Gao, Mohan
New Results of Breaking the CLS Scheme from ACM-CCS 2014 2022 Gao, Jing
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices 2022 Tan, Teik Guan
A Note on the Security Framework of Two-key DbHtS MACs 2022 Guo, Tingting
Fast Fourier Orthogonalization over NTRU Lattices 2022 Sun, Shuo
Tight Analysis of Decryption Failure Probability of Kyber in Reality 2022 Fang, Boyue
Alle Artikel auflisten