Peep with a mirror: Breaking the integrity of Android app sandboxing via unprivileged cache side channel
Application sandboxing is a well-established security principle employed in the Android platform to safeguard sensitive information. However, hardware resources, specifically the CPU caches, are beyond the protection of this software-based mechanism, leaving room for potential side-channel attacks....
Saved in:
Main Authors: | LIN, Yan, WONG, Joshua, LI, Xiang, MA, Haoyu, GAO, Debin |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2024
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/9354 https://ink.library.smu.edu.sg/context/sis_research/article/10354/viewcontent/usenixsecurity24_lin_yan.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Towards mining comprehensive Android sandboxes
by: LE, Tien-Duy B., et al.
Published: (2018) -
Secure repackage-proofing framework for Android apps using Collatz conjecture
by: MA, Haoyu, et al.
Published: (2021) -
Active warden attack: On the (in)effectiveness of Android app repackage-proofing
by: MA, Haoyu, et al.
Published: (2022) -
On the effectiveness of using graphics interrupt as a side channel for user behavior snooping
by: MA, Haoyu, et al.
Published: (2022) -
Peep into the deep
by: Ow Yong, Brenda Shu Yi
Published: (2020)