[go: up one dir, main page]

Kim et al., 2018 - Google Patents

Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications

Kim et al., 2018

Document ID
8922872004574054659
Author
Kim S
Kim J
Kim S
Shin S
Yi J
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

In the provision of on-demand personalized services in an IoT-based hyper-connected network, it is inevitable for the mobile device that centrally controls personal information to become the focal point. In this IoT environment, because mobile devices serve as a gateway …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

Publication Publication Date Title
CN112514321B (en) Shared secret establishment
US11281769B2 (en) Software integrity verification
US7103779B2 (en) Method and apparatus for incremental code signing
Kim et al. Anti-reversible dynamic tamper detection scheme using distributed image steganography for IoT applications
KR100996784B1 (en) One or more computer readable media storing a method, system and a plurality of instructions implemented in a computing device for storage and retrieval of data based on public key encryption.
KR101067399B1 (en) One or more computer readable media storing a method, system and a plurality of instructions implemented in a computing device for storage and retrieval of data based on symmetric key encryption.
US20170116410A1 (en) Software protection
Petracca et al. {AWare}: Preventing Abuse of {Privacy-Sensitive} Sensors via Operation Bindings
US20170323120A1 (en) Method and apparatus for dynamic executable verification
CN109644196A (en) Message protection
Mladenov et al. 1 trillion dollar refund: How to spoof pdf signatures
Thorsteinson et al. NET security and cryptography
Pfeffer et al. On the usability of authenticity checks for hardware security tokens
Rohlmann et al. Breaking the specification: PDF certification
Mainka et al. Shadow Attacks: Hiding and Replacing Content in Signed PDFs.
Gunn et al. Hardware platform security for mobile devices
Gallery et al. Trusted computing: Security and applications
Maass et al. In-nimbo sandboxing
CN118070283A (en) Software security verification method and device, electronic equipment and storage medium
Cho et al. A Strengthened Android Signature Management Method.
CN111046440B (en) Tamper verification method and system for secure area content
TWI628558B (en) a method of indicating a mobile device operating environment and a mobile device capable of indicating an operating environment
DeFreez et al. A first look at Firefox OS security
KR101642252B1 (en) Apparatus for tamper detection on mobile application using image resource file and method thereof
Sadeghi et al. Towards multilaterally secure computing platforms—with open source and trusted computing