Conference item icon

Conference item

Analysis of trusted execution environment usage in Samsung KNOX

Abstract:

Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. In order to mitigate risks arising from attacks, various approaches have been proposed including the use of Trusted Execution Environment (TEE) to isolate and protect the execution of sensitive code from...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Files:
Publisher copy:
10.1145/3007788.3007795

Authors


More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
More by this author
Institution:
University of Oxford
Division:
MPLS
Department:
Computer Science
Role:
Author
Publisher:
Association for Computing Machinery Publisher's website
Host title:
SysTEX '16 Proceedings of the 1st Workshop on System Software for Trusted Execution
Publication date:
2016-01-01
Acceptance date:
2016-11-05
DOI:
Source identifiers:
668734
ISBN:
9781450346702
Keywords:
Pubs id:
pubs:668734
UUID:
uuid:8f01389d-1fa8-4771-917c-750fa65bbdee
Local pid:
pubs:668734
Deposit date:
2017-01-10

Terms of use


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP