Building trusted path on untrusted device drivers for mobile devices

@inproceedings{Li2014BuildingTP,
  title={Building trusted path on untrusted device drivers for mobile devices},
  author={Wenhao Li and Mingyang Ma and Jinchen Han and Yubin Xia and Binyu Zang and Cheng-Kang Chu and Tieyan Li},
  booktitle={APSys},
  year={2014}
}
Mobile devices are frequently used as terminals to interact with many security-critical services such as mobile payment and online banking. However, the large client software stack and the continuous proliferation of malware expose such interaction under various threats, including passive attacks like phishing and active ones like direct code manipulation. This paper proposes TrustUI, a new trusted path design for mobile devices that enables secure interaction between end users and services… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 41 CITATIONS

Secure Execution of Mutually Mistrusting Software

VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Secure Input Overlays : increasing security for sensitive data on Android

VIEW 5 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

TrustZone-Assisted Facial Authentication on Smartphone

VIEW 3 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

ALTEE: Constructing Trustworthy Execution Environment for Mobile App Dynamically

VIEW 1 EXCERPT
CITES BACKGROUND

Demystifying Arm TrustZone: A Comprehensive Survey

VIEW 3 EXCERPTS
CITES BACKGROUND

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs

VIEW 1 EXCERPT
CITES RESULTS

Establishing Trusted I/O Paths for SGX Client Systems With Aurora

VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-4 OF 4 REFERENCES