TZMon: Improving mobile game security with ARM trustzone

S Jeon, HK Kim - Computers & Security, 2021 - Elsevier
As the game industry is moving from PC to smartphone platforms, security problems related
to mobile games are becoming critical. Considering the characteristics of mobile games …

DriverJar: Lightweight Device Driver Isolation for ARM

H Wu, Y Chen, Y Zhou, Y Wang… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Driver-originated vulnerabilities are well-known threats to modern monolithic kernels.
However, existing driver isolation solutions either rely on Intel-only or newly-introduced CPU …

Formal Modeling and Security Analysis for Intra-level Privilege Separation

Y Guo, Z Wang, B Zhong, Q Zeng - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Privileged system software such as mainstream operating system kernels and hypervisors
have an ongoing stream of vulnerabilities. Even the inflated secure world in Trusted …

[PDF][PDF] On memory addressing

R Achermann - 2020 - research-collection.ethz.ch
Operating systems manage and configure a machine's physical resources such as memory
and translation hardware. This task is mission critical: the operating system must always …

A hardware platform for ensuring OS kernel integrity on RISC-V

D Kwon, D Hwang, Y Paek - Electronics, 2021 - mdpi.com
The OS kernel is typically preassumed as a trusted computing base in most computing
systems. However, it also implies that once an attacker takes control of the OS kernel, the …

Mitigating the Knock-on-Effect of DDoS Attacks on Application Layer using Deep Learning Multi-Layer Perception

M Shah, S Ahmed, M Hussain, S Jan - Journal of Information …, 2020 - jictra.com.pk
Abstract Distributed Denial of Service (DDoS) attacks are a significant threat to the Internet
today, and application-layer DDoS attacks that use legitimate HTTP requests to overwhelm …

Two-Factor Authentication for Safe Deposit Box Based on Embedded System

A Siswanto, A Efendi, Z Hasrin, B Arifin - International conference on smart …, 2021 - Springer
Security is one of the most significant needs for people everywhere. Likewise, people
usually use a safe deposit box (SDB) to store valuables for the storage of goods. However …

[PDF][PDF] Two Factor Authentication Turnitin

A Siswanto - repository.uir.ac.id
Security is one of the most significant needs for people everywhere. Likewise, people
usually use a safe deposit box (SDB) to store valuables for the storage of goods. However …

[PDF][PDF] A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS)

NHF Beebe - 2024 - netlib.sandia.gov
A Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Page 1 A
Complete Bibliography of ACM Transactions on Privacy and Security (TOPS) Nelson HF …