Conference item icon

Conference item

Analysis of trusted execution environment usage in Samsung KNOX

Abstract:

Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. In order to mitigate risks arising from attacks, various approaches have been proposed including the use of Trusted Execution Environment (TEE) to isolate and protect the execution of sensitive code from...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed
Version:
Accepted Manuscript

Actions


Access Document


Files:
Publisher copy:
10.1145/3007788.3007795

Authors


More by this author
Department:
Oxford, MPLS, Computer Science
Role:
Author
More by this author
Department:
Oxford, MPLS, Computer Science
Role:
Author
More by this author
Department:
Oxford, MPLS, Computer Science
Role:
Author
More by this author
Department:
Oxford, MPLS, Computer Science
Role:
Author
Publisher:
Association for Computing Machinery Publisher's website
Publication date:
2016-01-01
Acceptance date:
2016-11-05
DOI:
Pubs id:
pubs:668734
URN:
uri:8f01389d-1fa8-4771-917c-750fa65bbdee
UUID:
uuid:8f01389d-1fa8-4771-917c-750fa65bbdee
Local pid:
pubs:668734
ISBN:
978-1-4503-4670-2

Terms of use


Metrics


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP