共 15 条
[2]
PrivateZone: Providing a Private Execution Environment Using ARM TrustZone[J] . Jinsoo Jang,Changho Choi,Jaehyuk Lee,Nohyun Kwak,Seongman Lee,Yeseul Choi,Brent Byunghoon Kang.IEEE Transactions on Dependable and Secure Comput . 2018 (5)
[4]
HyperCheck: A Hardware-AssistedIntegrity Monitor[J] . Zhang,F,Wang,J,Sun,K,Stavrou,A.IEEE Transactions on Dependable and Secure Computing . 2014 (4)
[5]
A survey of mobile cloud computing: architecture, applications, and approaches[J] . Hoang T. Dinh,Chonho Lee,Dusit Niyato,Ping Wang.Wirel. Commun. Mob. Comput. . 2013 (18)
[6]
Internet of Things (IoT): A vision, architectural elements, and future directions[J] . Jayavardhana Gubbi,Rajkumar Buyya,Slaven Marusic,Marimuthu Palaniswami.Future Generation Computer Systems . 2013 (7)
[8]
Shielding applications from an untrusted cloud with Haven .2 Baumann A,Peinado M,Hunt G. Proc of the 11th USENIX Symp on Operating Systems Design and Implement-ation . 2014
[9]
Preventing and detecting Xen hypervisor subversions .2 Rutkowska J,Wojtczuk R. https://invisiblethingslab.com/resources/bh08/part2-full.pdf . 2015
[10]
Tenable Blog:Rediscovering the Intel AMT Vulnerability .2 Carlos Perez. https://www.tenable.com/blog/rediscovering-the-intel-amt-vulnerability . 2018