Bypassing information leakage protection with trusted applications

Jorge Blasco, Julio Cesar Hernandez-Castro, Juan E. Tapiador, Arturo Ribagorda

Research output: Contribution to journalArticlepeer-review

Original languageEnglish
Pages (from-to)557-568
Number of pages12
JournalComputers and Security
Volume31
Issue number4
DOIs
Publication statusPublished - 1 Jun 2012

Keywords

  • Data leakage
  • Evasion
  • Information leakage
  • Malicious insiders
  • Sensitive information
  • Trusted applications

Cite this