[go: nahoru, domu]

Mitchell et al., 2015 - Google Patents

Cashtags: Protecting the input and display of sensitive data

Mitchell et al., 2015

View PDF
Document ID
9049491698372518575
Author
Mitchell M
Wang A
Reiher P
Publication year
Publication venue
24th USENIX Security Symposium (USENIX Security 15)

External Links

Snippet

Mobile computing is the new norm. As people feel increasingly comfortable computing in public places such as coffee shops and transportation hubs, the threat of exposing sensitive information increases. While solutions exist to guard the communication channels used by …
Continue reading at www.usenix.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F1/00Details of data-processing equipment not covered by groups G06F3/00 - G06F13/00, e.g. cooling, packaging or power supply specially adapted for computer application
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems adapted for combination with other electrical systems
    • H04M11/08Telephonic communication systems adapted for combination with other electrical systems adapted for optional reception of entertainment or informative matter
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/14Systems for two-way working
    • H04N7/141Systems for two-way working between two video terminals, e.g. videophone
    • H04N7/147Communication arrangements, e.g. identifying the communication as a video-communication, intermediate storage of the signals

Similar Documents

Publication Publication Date Title
US10025952B1 (en) Obfuscation of sensitive human-perceptual output
US11593055B2 (en) Selective screen sharing
Do et al. Is the data on your wearable device secure? An Android Wear smartwatch case study
Kim et al. A new shoulder-surfing resistant password for mobile environments
US11082425B2 (en) Pressure-based authentication
Mohsen et al. Android keylogging threat
CN109492412A (en) The encryption storage method and system of file
CN112559987A (en) Multi-factor authentication via multiple devices
Kumar et al. From gadget to gadget-free hyperconnected world: Conceptual analysis of user privacy challenges
US20140281549A1 (en) Methods and apparatus for securing user input in a mobile device
CN106203141A (en) The data processing method of a kind of application and device
Vecchiato et al. The perils of Android security configuration
Mueller Security for Web Developers: Using JavaScript, HTML, and CSS
US20150310206A1 (en) Password management
KR101914416B1 (en) System for providing security service based on cloud computing
Yang et al. Inference attack in android activity based on program fingerprint
Cho et al. Vulnerabilities of android data sharing and malicious application to leaking private information
Mitchell et al. Cashtags: Protecting the input and display of sensitive data
Mitchell et al. Cashtags: Prevent leaking sensitive information through screen display
CN106933666B (en) Method for calling information input program and electronic equipment
CN115996140A (en) Access content acquisition method, device, equipment and storage medium
Gangwal et al. AutoSpill: Credential Leakage from Mobile Password Managers
Dhanjani New age application attacks against apple’s iOS (and countermeasures)
Hidhaya et al. Supplementary event-listener injection attack in smart phones
Nomoto et al. Understanding the Inconsistencies in the Permissions Mechanism of Web Browsers