Skip to main navigation Skip to search Skip to main content

Bypassing information leakage protection with trusted applications

  • Jorge Blasco
  • , Julio Cesar Hernandez-Castro
  • , Juan E. Tapiador
  • , Arturo Ribagorda

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Pages (from-to)557-568
Number of pages12
JournalComputers and Security
Volume31
Issue number4
DOIs
Publication statusPublished - 1 Jun 2012

Keywords

  • Data leakage
  • Evasion
  • Information leakage
  • Malicious insiders
  • Sensitive information
  • Trusted applications

Cite this