Kim et al., 2018 - Google Patents
Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applicationsKim et al., 2018
- Document ID
- 8922872004574054659
- Author
- Kim S
- Kim J
- Kim S
- Shin S
- Yi J
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
In the provision of on-demand personalized services in an IoT-based hyper-connected network, it is inevitable for the mobile device that centrally controls personal information to become the focal point. In this IoT environment, because mobile devices serve as a gateway …
- 238000001514 detection method 0 title abstract description 39
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112514321B (en) | Shared secret establishment | |
US11281769B2 (en) | Software integrity verification | |
US7103779B2 (en) | Method and apparatus for incremental code signing | |
Kim et al. | Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications | |
KR100996784B1 (en) | One or more computer readable media storing a method, system and a plurality of instructions implemented in a computing device for storage and retrieval of data based on public key encryption. | |
KR101067399B1 (en) | One or more computer readable media storing a method, system and a plurality of instructions implemented in a computing device for storage and retrieval of data based on symmetric key encryption. | |
US20170116410A1 (en) | Software protection | |
Petracca et al. | {AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings | |
US20170323120A1 (en) | Method and apparatus for dynamic executable verification | |
CN109644196A (en) | Message protection | |
Mladenov et al. | 1 trillion dollar refund: How to spoof pdf signatures | |
Thorsteinson et al. | NET security and cryptography | |
Pfeffer et al. | On the usability of authenticity checks for hardware security tokens | |
Rohlmann et al. | Breaking the specification: PDF certification | |
Mainka et al. | Shadow Attacks: Hiding and Replacing Content in Signed PDFs. | |
Gunn et al. | Hardware platform security for mobile devices | |
Gallery et al. | Trusted computing: Security and applications | |
Maass et al. | In-nimbo sandboxing | |
CN118070283A (en) | Software security verification method and device, electronic equipment and storage medium | |
Cho et al. | A Strengthened Android Signature Management Method. | |
CN111046440B (en) | Tamper verification method and system for secure area content | |
TWI628558B (en) | a method of indicating a mobile device operating environment and a mobile device capable of indicating an operating environment | |
DeFreez et al. | A first look at Firefox OS security | |
KR101642252B1 (en) | Apparatus for tamper detection on mobile application using image resource file and method thereof | |
Sadeghi et al. | Towards multilaterally secure computing platforms—with open source and trusted computing |