Author of the publication

SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions.

, , , , , and . MSN, page 387-394. IEEE, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TrustSAMP: Securing Streaming Music Against Multivector Attacks on ARM Platform., , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Transplantation Attack: Analysis and Prediction., , , and . SecureComm (2), volume 153 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 367-374. Springer, (2014)SASAK: Shrinking the Attack Surface for Android Kernel with Stricter "seccomp" Restrictions., , , , , and . MSN, page 387-394. IEEE, (2020)A Secure And High Concurrency SM2 Cooperative Signature Algorithm For Mobile Network., , , , and . MSN, page 818-824. IEEE, (2021)DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5., , , , , and . Comput. Secur., (2019)CacheIEE: Cache-Assisted Isolated Execution Environment on ARM Multi-Core Platforms., , , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (1): 254-269 (January 2024)TrustICT: an efficient trusted interaction interface between isolated execution domains on ARM multi-core processors., , , , , and . SenSys, page 271-284. ACM, (2020)MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring., , , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 78-91. Springer, (2012)WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps., , , , and . ICISC, volume 8949 of Lecture Notes in Computer Science, page 255-268. Springer, (2014)A Threat to Mobile Cyber-Physical Systems: Sensor-Based Privacy Theft Attacks on Android Smartphones., , , , and . TrustCom/ISPA/IUCC, page 126-133. IEEE Computer Society, (2013)