Search

Your search keyword '"Trustzone"' showing total 89 results

Search Constraints

Start Over You searched for: Descriptor "Trustzone" Remove constraint Descriptor: "Trustzone" Search Limiters Full Text Remove constraint Search Limiters: Full Text
89 results on '"Trustzone"'

Search Results

1. Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms.

2. Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms

3. A Novel Network Data Encryption Method Based on TrustZone.

4. Trusted Deep Neural Execution—A Survey

5. The Data Privacy Protection Method for Hyperledger Fabric Based on Trustzone.

6. Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration

7. uTango: An Open-Source TEE for IoT Devices

8. Cross-World Covert Channel on ARM Trustzone through PMU.

9. DeepTrust^RT: Confidential Deep Neural Inference Meets Real-Time!

10. Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration †.

11. The Data Privacy Protection Method for Hyperledger Fabric Based on Trustzone

12. Nanovised Control Flow Attestation.

13. A Design and Verification Methodology for a TrustZone Trusted Execution Environment

14. Cross-World Covert Channel on ARM Trustzone through PMU

15. TZmCFI: RTOS-Aware Control-Flow Integrity Using TrustZone for Armv8-M.

16. Trustzone-based secure lightweight wallet for hyperledger fabric.

17. Nanovised Control Flow Attestation

18. Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

19. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone

20. ShieLD : Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack

21. On-Device Power Analysis Across Hardware Security Domains.

22. Demystifying Arm TrustZone: A Comprehensive Survey.

23. Building Trust for Smart Connected Devices: The Challenges and Pitfalls of TrustZone

24. Nanovised Control Flow Attestation

25. μRTZVisor: A Secure and Safe Real-Time Hypervisor.

26. uTango: an open-source TEE for IoT devices

27. ShieLD: Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack

28. Attacking TrustZone on devices lacking memory protection

29. Trusted Operations on Sensor Data †

30. Securing IoT communications using trusted execution environments

31. Self-secured devices: high performance and secure I/O access in TrustZone-based systems

32. A TrustEnclave-Based Architecture for Ensuring Run-Time Security in Embedded Terminals.

33. A Private User Data Protection Mechanism in TrustZone Architecture Based on Identity Authentication.

34. Securing IoT communications using trusted execution environments

35. KEVLAR-TZ: A Secure Cache for ARM TrustZone

36. TrustZone based attestation in secure runtime verification for embedded systems

37. Suporte para múltiplos sistemas operativos em microcontroladores com TrustZone-M

38. Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

39. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone

40. Secure microcontrollers

41. PSpSys: A time-predictable mixed-criticality system architecture based on ARM TrustZone.

42. Towards a TrustZone-Assisted Hypervisor for Real-Time Embedded Systems

43. IIoTEED: An Enhanced, Trusted Execution Environment for Industrial IoT Edge Devices

44. Αξιολόγηση της ασφάλειας των αξιόπιστων περιβάλλοντων εκτέλεσης που βασίζονται στη τεχνολογία Trustzone

45. Arm security alternatives

46. Securing PIN-based authentication in smartwatches with just two gestures

48. Secure boot, trusted boot and remote attestation for ARM TrustZone-based IoT Nodes.

50. Introspection for ARM TrustZone with the ITZ library

Catalog

Books, media, physical & digital resources