Kanonov et al., 2016 - Google Patents
Secure containers in Android: the Samsung KNOX case studyKanonov et al., 2016
View PDF- Document ID
- 10755558544806159318
- Author
- Kanonov U
- Wool A
- Publication year
- Publication venue
- Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices
External Links
Snippet
Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and productivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever-growing. Such dangers can be mitigated by …
- 241000613130 Tima 0 description 45
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Kanonov et al. | Secure containers in Android: the Samsung KNOX case study | |
| Mayrhofer et al. | The android platform security model | |
| Buhren et al. | Insecure until proven updated: analyzing AMD SEV's remote attestation | |
| Cheng et al. | Radiatus: a shared-nothing server-side web architecture | |
| Shabtai et al. | Google android: A state-of-the-art review of security mechanisms | |
| Cooijmans et al. | Analysis of secure key storage solutions on android | |
| Shakevsky et al. | Trust dies in darkness: Shedding light on samsung's {TrustZone} keymaster design | |
| Wong et al. | Threat modeling and security analysis of containers: A survey | |
| Yang et al. | Security challenges in the container cloud | |
| Liebergeld et al. | Android security, pitfalls and lessons learned | |
| Roy et al. | Secure the cloud: From the perspective of a service-oriented organization | |
| CN106411814B (en) | Method and system for policy management | |
| Jarkas et al. | A Container Security Survey: Exploits, Attacks, and Defenses | |
| Condé et al. | Using Intel SGX to protect authentication credentials in an untrusted operating system | |
| Dorjmyagmar et al. | Security analysis of samsung knox | |
| Hicks et al. | An architecture for enforcing end-to-end access control over web applications | |
| Song et al. | Tz-ima: Supporting integrity measurement for applications with arm trustzone | |
| Park et al. | SecureDom: secure mobile-sensitive information protection with domain separation | |
| Morbitzer | Scanclave: verifying application runtime integrity in untrusted environments | |
| Yan et al. | SplitDroid: isolated execution of sensitive components for mobile applications | |
| Knockel et al. | Protecting Free and Open Communications on the Internet Against Man-in-the-Middle Attacks on Third-Party Software: We're FOCI'd. | |
| Čović | Threats and Vulnerabilities in Web Applications and How to Avoid Them | |
| Wang et al. | RootFree Attacks: Exploiting Mobile Platform's Super Apps From Desktop | |
| Kouraogo et al. | Security model on mobile banking application: attack simulation and countermeasures | |
| Nair et al. | An innovative model (HS) to enhance the security in Windows operating system-A case study |