Systematic literature review on the use of trusted execution environments to protect cloud/fog-based internet of things applications

DCG Valadares, NC Will, J Caminha… - IEEE …, 2021 - ieeexplore.ieee.org
Trusted Execution Environments have been applied to improve data security in many distinct
application scenarios since they enable data processing in a separate and protected region …

Teezz: Fuzzing trusted applications on cots android devices

M Busch, A Machiry, C Spensky… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Security and privacy-sensitive smartphone applications use trusted execution environments
(TEEs) to protect sensitive operations from malicious code. By design, TEEs have privileged …

Who watches the watchmen: A security-focused review on current state-of-the-art techniques, tools, and methods for systems and binary analysis on modern platforms

M Botacin, PLD Geus, A Grégio - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Malicious software, a threat users face on a daily basis, have evolved from simple bankers
based on social engineering to advanced persistent threats. Recent research and …

Hypervisor-assisted dynamic malware analysis

RS Leon, M Kiperberg, AA Leon Zabag, NJ Zaidenberg - Cybersecurity, 2021 - Springer
Malware analysis is a task of utmost importance in cyber-security. Two approaches exist for
malware analysis: static and dynamic. Modern malware uses an abundance of techniques to …

A client/server malware detection model based on machine learning for android devices

A Fournier, F El Khoury, S Pierre - IoT, 2021 - mdpi.com
The rapid adoption of Android devices comes with the growing prevalence of mobile
malware, which leads to serious threats to mobile phone security and attacks private …

Microtee: designing tee os based on the microkernel architecture

D Ji, Q Zhang, S Zhao, Z Shi… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
ARM TrustZone technology is widely used to provide Trusted Execution Environments (TEE)
for mobile devices. However, most TEE OSes are implemented as monolithic kernels. In …

Large-scale validation of hypothesis generation systems via candidate ranking

J Sybrandt, M Shtutman, I Safro - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The first step of many research projects is to define and rank a short list of candidates for
study. In the modern rapidity of scientific progress, some turn to automated hypothesis …

Hail to the Thief: Protecting data from mobile ransomware with ransomsafedroid

SD Yalew, GQ Maguire, S Haridi… - 2017 IEEE 16th …, 2017 - ieeexplore.ieee.org
The growing popularity of Android and the increasing amount of sensitive data stored in
mobile devices have lead to the dissemination of Android ransomware. Ransomware is a …

TruApp: A TrustZone-based authenticity detection service for mobile apps

SD Yalew, P Mendonca, GQ Maguire… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
In less than a decade, mobile apps became an integral part of our lives. In several situations
it is important to provide assurance that a mobile app is authentic, ie, that it is indeed the app …

Secure Mobile ID Architecture on Android Devices based on Trust Zone

KK Kamal, S Gupta, P Joshi… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Owing to their mobility, persistent connectivity, and variety of applications, cell phones are
now more often used as a primary computing platform than desktop computers and laptops …