[go: up one dir, main page]

Kanonov et al., 2016 - Google Patents

Secure containers in Android: the Samsung KNOX case study

Kanonov et al., 2016

View PDF
Document ID
10755558544806159318
Author
Kanonov U
Wool A
Publication year
Publication venue
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices

External Links

Snippet

Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and productivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever-growing. Such dangers can be mitigated by …
Continue reading at arxiv.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Kanonov et al. Secure containers in Android: the Samsung KNOX case study
Mayrhofer et al. The android platform security model
Buhren et al. Insecure until proven updated: analyzing AMD SEV's remote attestation
Cheng et al. Radiatus: a shared-nothing server-side web architecture
Shabtai et al. Google android: A state-of-the-art review of security mechanisms
Cooijmans et al. Analysis of secure key storage solutions on android
Shakevsky et al. Trust dies in darkness: Shedding light on samsung's {TrustZone} keymaster design
Wong et al. Threat modeling and security analysis of containers: A survey
Yang et al. Security challenges in the container cloud
Liebergeld et al. Android security, pitfalls and lessons learned
Roy et al. Secure the cloud: From the perspective of a service-oriented organization
CN106411814B (en) Method and system for policy management
Jarkas et al. A Container Security Survey: Exploits, Attacks, and Defenses
Condé et al. Using Intel SGX to protect authentication credentials in an untrusted operating system
Dorjmyagmar et al. Security analysis of samsung knox
Hicks et al. An architecture for enforcing end-to-end access control over web applications
Song et al. Tz-ima: Supporting integrity measurement for applications with arm trustzone
Park et al. SecureDom: secure mobile-sensitive information protection with domain separation
Morbitzer Scanclave: verifying application runtime integrity in untrusted environments
Yan et al. SplitDroid: isolated execution of sensitive components for mobile applications
Knockel et al. Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd.
Čović Threats and Vulnerabilities in Web Applications and How to Avoid Them
Wang et al. RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop
Kouraogo et al. Security model on mobile banking application: attack simulation and countermeasures
Nair et al. An innovative model (HS) to enhance the security in Windows operating system-A case study