Filters








6 Hits in 2.9 sec

Using ARM trustzone to build a trusted language runtime for mobile applications

Nuno Santos, Himanshu Raj, Stefan Saroiu, Alec Wolman
2014 Proceedings of the 19th international conference on Architectural support for programming languages and operating systems - ASPLOS '14  
TLR provides runtime support for the secure component based on a .NET implementation for embedded devices.  ...  breaches.  ...  Another research area uses privilege separation for partitioning an application into security-sensitive and securityinsensitive components.  ... 
doi:10.1145/2541940.2541949 dblp:conf/asplos/SantosRSW14 fatcat:gocjg6d3e5efvoyumi7hmmht7m

Approaches to Curbing Data Breaches in Internet Banking based on Cloud computing

Okiyai Otieng, George Okeyo, Wilson Cheruiyot
2018 International Journal of Computer Applications  
One such threat is data breach, this is because data is stored in different places across the globe hence difficult for security to be monitored.  ...  This paper sought to establish the available security measures employed in curbing data breaches, their shortcomings and suggest possible solutions.  ...  [22] , have presented the TrustBox, a security architecture for preventing data breaches. The approach proposed provides a platform, network and security when offline.  ... 
doi:10.5120/ijca2018917411 fatcat:wbs4ktxhi5cjdkizaxyhs76slm

Trusted Access Control System for Smart Campus

Mohamed Amine Bouazzouni, Emmanuel Conchon, Fabrice Peyrard, Pierre-Francois Bonnefoi
2016 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)  
In this paper, we will present a proposal of an architecture to build a secure access control system based on Trusted Execution Environments (TEE) and Identity Based Encryption (IBE) mechanisms.  ...  Furthermore, the cost of the deployment of secure cards for large organizations (DESFIRE for instance) is expensive.  ...  Acknowledgment This research is part of the neOCampus[6] project to promote a demonstrator of connected campus, innovative, smart and durable. The authors wish to thank the committee for its support.  ... 
doi:10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0157 dblp:conf/uic/BouazzouniCPB16 fatcat:b7pc2mflhzccpfefxer4u2ey7e

Data exfiltration: A review of external attack vectors and countermeasures

Faheem Ullah, Matthew Edwards, Rajiv Ramdhany, Ruzanna Chitchyan, M. Ali Babar, Awais Rashid
2018 Journal of Network and Computer Applications  
on protecting data in 'in use' state, therefore, future research needs to be directed towards securing data in 'in rest' and 'in transit' states (e) There is no standard or framework for evaluation of  ...  These countermeasures aim to detect, prevent, or investigate exfiltration of sensitive or private data.  ...  [55] present a security architecture, called Shield, for secure file sharing in a cloud environment.  ... 
doi:10.1016/j.jnca.2017.10.016 fatcat:fweg67tparct5owb3r4qrpgvxq

Improving trust in cloud, enterprise, and mobile computing platforms [article]

Nuno Miguel Carvalho Santos, Universität Des Saarlandes, Universität Des Saarlandes
2013
The TLR leverages ARM TrustZone technology to protect mobile apps from OS security breaches.  ...  For mobile platforms, we present the Trusted Language Runtime (TLR), a software system for hosting mobile apps with stringent security needs (e.g., e-wallet).  ...  Prevention of security breaches due to IT mismanagement is not easy, especially in large organizations.  ... 
doi:10.22028/d291-25366 fatcat:lprbelewircbfnerabtey2ua2y

A method for security breach detection through file access monitoring and pattern recognition [article]

Zeynep Öztürk, Universität Stuttgart, Universität Stuttgart
2017
Intrusion Detection Systems (IDS) or Intrusion Prevention Systems (IPS) are typical protection mechanisms that monitor security breaches.  ...  that can react with countermeasures to a security breach.  ...  In other words, SELinux decides whether a resource is allowed to access a certain target or not 5 . TrustBox is a security architecture to prevent data breaches.  ... 
doi:10.18419/opus-9281 fatcat:a2vckwbgrbcoxbjyjbtalabsp4