Analysis of trusted execution environment usage in Samsung KNOX

Mobile systems have become widely adopted by users to perform sensitive operations ranging from on-line payments for personal use to remote access to enterprise assets. Thus, attacks on mobile devices can cause significant loss to user's personal data as well as to valuable enterprise assets. I...

全面介紹

書目詳細資料
Main Authors: Atamli-Reineh, A, Borgaonkar, R, Balisane, R, Petracca, G, Martin, A
格式: Conference item
出版: Association for Computing Machinery 2016