An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems (English)
- New search for: Hizver, Jennia
- New search for: Chiueh, Tzi-cker
- New search for: Hizver, Jennia
- New search for: Chiueh, Tzi-cker
In:
Financial Cryptography and Data Security
1
;
55-69
;
2012
- Article/Chapter (Book) / Electronic Resource
-
Title:An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale Systems
-
Contributors:Hizver, Jennia ( author ) / Chiueh, Tzi-cker ( author )
-
Published in:Financial Cryptography and Data Security , 1 ; 55-69Lecture Notes in Computer Science ; 7126, 1 ; 55-69
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2012-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Cryptographic Protocols: From the Abstract to the Practical to the ActualYung, Moti et al. | 2012
- 3
-
Toward Real-Life Implementation of Signature Schemes from the Strong RSA AssumptionYu, Ping / Xue, Rui et al. | 2012
- 13
-
Detailed Cost Estimation of CNTW Attack against EMV Signature SchemeIzu, Tetsuya / Morikawa, Yoshitaka / Nogami, Yasuyuki / Sakemi, Yumi / Takenaka, Masahiko et al. | 2012
- 27
-
Fast Elliptic Curve Cryptography in OpenSSLKäsper, Emilia et al. | 2012
- 40
-
Cryptographic Treatment of Private User ProfilesGünther, Felix / Manulis, Mark / Strufe, Thorsten et al. | 2012
- 55
-
An Introspection-Based Memory Scraper Attack against Virtualized Point of Sale SystemsHizver, Jennia / Chiueh, Tzi-cker et al. | 2012
- 70
-
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID AuthenticationHanataniI, Yoshikazu / Ohkubo, Miyako / Matsuo, Shin’ichiro / Sakiyama, Kazuo / Ohta, Kazuo et al. | 2012
- 88
-
Biometric Transaction Authentication Protocol: Formal Model Verification and “Four-Eyes” Principle ExtensionHartung, Daniel / Busch, Christoph et al. | 2012
- 104
-
Exploration and Field Study of a Password Manager Using Icon-Based PasswordsBicakci, Kemal / Atalay, Nart Bedin / Yuceel, Mustafa / Oorschot, P. C. et al. | 2012
- 119
-
Ethical Issues in E-Voting Security AnalysisRobinson, David G. / Halderman, J. Alex et al. | 2012
- 131
-
Computer Security Research with Human Subjects: Risks, Benefits and Informed ConsentJohnson, Maritza L. / Bellovin, Steven M. / Keromytis, Angelos D. et al. | 2012
- 138
-
Human Subjects, Agents, or Bots: Current Issues in Ethics and Computer Security ResearchAycock, John / Buchanan, Elizabeth / Dexter, Scott / Dittrich, David et al. | 2012
- 146
-
Enforced Community Standards for Research on Users of the Tor Anonymity NetworkSoghoian, Christopher et al. | 2012
- 154
-
Ethical Dilemmas in Take-Down ResearchMoore, Tyler / Clayton, Richard et al. | 2012
- 169
-
Ethical Considerations of Sharing Data for Cybersecurity ResearchShou, Darren et al. | 2012
- 178
-
Moving Forward, Building an Ethics Community (Panel Statements)Kenneally, Erin / Stavrou, Angelos / McHugh, John / Christin, Nicolas et al. | 2012