Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on …
A trusted path is a protected channel that assures the secrecy and authenticity of data transfers between a user's input/output (I/O) device and a program trusted by that user. We …
Commodity mobile devices have been utilized as sensor nodes in a variety of domains, including citizen journalism, mobile social services, and domestic eldercare. In each of these …
S Saroiu, A Wolman - Proceedings of the Eleventh Workshop on Mobile …, 2010 - dl.acm.org
Despite the popularity of adding sensors to mobile devices, the readings provided by these sensors cannot be trusted. Users can fabricate sensor readings with relatively little effort …
VR Kebande, HS Venter - Australian Journal of Forensic Sciences, 2018 - Taylor & Francis
This paper examines the design and implementation of a feasible technique for performing Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs …
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer's state. We examine research on …
EG Sirer, W de Bruijn, P Reynolds, A Shieh… - Proceedings of the …, 2011 - dl.acm.org
This paper describes the design and implementation of a new operating system authorization architecture to support trustworthy computing. Called logical attestation, this …
With the widespread adoption of Internet advertising, fraud has become a systemic problem. While the existence of clickbots—malware specialized for conducting click-fraud—has been …
Studies show that a significant portion of networked computers are infected with stealthy malware. Infection allows remote attackers to control, utilize, or spy on victim machines …