Protecting smart phones by means of execution replication


Smartphones have come to resemble PCs in software complexity, with complexity usually leading to bugs and vulnerabilities. Moreover, as smartphones are increasingly used for financial transactions and other privacysensitive tasks, they are becoming attractive targets for attackers. Unfortunately, smartphones are quite different from PCs in terms of resource… (More)


8 Figures and Tables

Cite this paper

@inproceedings{Portokalidis2010ProtectingSP, title={Protecting smart phones by means of execution replication}, author={Georgios Portokalidis and Philip Homburg and Nicholas Fitzroy-Dale and Kostas Anagnostakis and Herbert Bos}, year={2010} }