Mirzamohammadi et al., 2017 - Google Patents
Ditio: Trustworthy auditing of sensor activities in mobile & iot devicesMirzamohammadi et al., 2017
View PDF- Document ID
- 17278392146158036765
- Author
- Mirzamohammadi S
- Chen J
- Sani A
- Mehrotra S
- Tsudik G
- Publication year
- Publication venue
- Proceedings of the 15th ACM conference on embedded network sensor systems
External Links
Snippet
Mobile and Internet-of-Things (IoT) devices, such as smartphones, tablets, wearables, smart home assistants (eg, Google Home and Amazon Echo), and wall-mounted cameras, come equipped with various sensors, notably camera and microphone. These sensors can …
- 230000000694 effects 0 title abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12277228B2 (en) | Computing devices with secure boot operations | |
Mirzamohammadi et al. | Ditio: Trustworthy auditing of sensor activities in mobile & iot devices | |
JP6484255B2 (en) | Host attestation, including trusted execution environment | |
KR101263061B1 (en) | Executing Secure Environment Initialization Commands on a Point-to-Point Interconnect System | |
US12105859B2 (en) | Managing storage of secrets in memories of baseboard management controllers | |
CN111158906B (en) | Active immunity credible cloud system | |
Brasser et al. | Regulating arm trustzone devices in restricted spaces | |
JP7256861B2 (en) | secure computer system | |
EP3049989A1 (en) | Protection scheme for remotely-stored data | |
US9537738B2 (en) | Reporting platform information using a secure agent | |
Schiffman et al. | Verifying system integrity by proxy | |
US20230289204A1 (en) | Zero Trust Endpoint Device | |
Pontes et al. | Attesting AMD SEV-SNP Virtual Machines with SPIRE | |
Wang et al. | SvTPM: A secure and efficient vTPM in the cloud | |
Brasser et al. | Softer Smartcards: Usable Cryptographic Tokens with Secure Execution | |
Yu et al. | A cloud certificate authority architecture for virtual machines with trusted platform module | |
McCune | Reducing the trusted computing base for applications on commodity systems | |
Pedone et al. | Trusted computing technology and proposals for resolving cloud computing security problems | |
Xiang et al. | Dynamic measurement protocol in infrastructure as a service | |
Mirzamohammadi | Security Monitor for Mobile Devices: Design and Applications | |
aw Ideler | Cryptography as a service in a cloud computing environment | |
Lentz | Assurance and Control over Sensitive Data on Personal Devices | |
US12306932B2 (en) | Attesting on-the-fly encrypted root disks for confidential virtual machines | |
McCune et al. | An execution infrastructure for TCB minimization | |
Gu et al. | NVIDIA GPU Confidential Computing Demystified |