Search

Your search keyword '"Trustzone"' showing total 137 results

Search Constraints

Start Over You searched for: Descriptor "Trustzone" Remove constraint Descriptor: "Trustzone"
137 results on '"Trustzone"'

Search Results

1. Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms.

2. Enabling Real-Time Restoration of Compromised ECU Firmware in Connected and Autonomous Vehicles

3. Trustworthy Environmental Monitoring Using Hardware-Assisted Security Mechanisms

4. Secure CV2X Using COTS Smartphones over LTE Infrastructure

5. Enabling Accurate Data Recovery for Mobile Devices Against Malware Attacks

6. A Novel Network Data Encryption Method Based on TrustZone.

7. Trusted Deep Neural Execution—A Survey

8. The Data Privacy Protection Method for Hyperledger Fabric Based on Trustzone.

9. TrustControl: Trusted Private Data Usage Control Based on Security Enhanced TrustZone.

10. Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration

11. Decentralized M-Learning Platform with Trusted Execution Environment

12. Combating the OS-Level Malware in Mobile Devices by Leveraging Isolation and Steganography

13. KeVlar-Tz: A Secure Cache for Arm TrustZone : (Practical Experience Report)

14. uTango: An Open-Source TEE for IoT Devices

15. Cross-World Covert Channel on ARM Trustzone through PMU.

16. DeepTrust^RT: Confidential Deep Neural Inference Meets Real-Time!

17. On the Cost-Effectiveness of TrustZone Defense on ARM Platform

18. Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration †.

19. The Data Privacy Protection Method for Hyperledger Fabric Based on Trustzone

20. SchrodinText: Strong Protection of Sensitive Textual Content of Mobile Applications.

21. Comparison among embedded system security protection schemes and their application case analysis.

22. Nanovised Control Flow Attestation.

23. OCRAM-Assisted Sensitive Data Protection on ARM-Based Platform

24. On the Performance of ARM TrustZone : (Practical Experience Report)

25. HiddenApp - Securing Linux Applications Using ARM TrustZone

26. A Design and Verification Methodology for a TrustZone Trusted Execution Environment

27. An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators

28. Development of an Embedded Platform for Secure CPS Services

29. Cross-World Covert Channel on ARM Trustzone through PMU

30. A survey of Intel SGX and its applications.

32. TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment

33. A Security Evaluation of FIDO’s UAF Protocol in Mobile and Embedded Devices

34. TZmCFI: RTOS-Aware Control-Flow Integrity Using TrustZone for Armv8-M.

35. SAPEM: Secure Attestation of Program Execution and Program Memory for IoT Applications.

36. Trustzone-based secure lightweight wallet for hyperledger fabric.

37. Nanovised Control Flow Attestation

38. Performance optimization of secure application based on TrustZone.

39. Using IM-Visor to stop untrusted IME apps from stealing sensitive keystrokes

40. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone

41. Securing PIN‐based authentication in smartwatches with just two gestures.

42. MQT-TZ: Secure MQTT Broker for Biomedical Signal Processing on the Edge.

43. PrOS: Light-Weight Privatized Se cure OSes in ARM TrustZone.

44. AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash

45. ARM Security Alternatives.

46. ShieLD : Shielding Cross-zone Communication within Limited-resourced IoT Devices running Vulnerable Software Stack

47. The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation

48. On-Device Power Analysis Across Hardware Security Domains.

49. A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices

50. TrustDump: Reliable Memory Acquisition on Smartphones

Catalog

Books, media, physical & digital resources