참고문헌
- Young-Ho Kim, Jeong-Nyeo Kim, "Building Secure Execution Environment for Mobile Platform Computers", 2011 First ACIS/JNU International Conference, IEEE, pp.119-122, 2011, DOI:10.1109/CNSI.2011.36
- Young-Ho Kim, Yun-Kyung Lee, and Jeong-Nye Kim. "TeeMo: A Generic Trusted Execution Framework for Mobile Devices", Computers, Networks, Systems, and Industrial Application International Conference, SERSC, Volume 8, 2012.
- J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on Smart Phones: Attacks, Implications and Opportunities," HotMobile'10, Feb. 2010, DOI:10.1145/1734583.1734596
- Trusted Computing Group, TCG Specification Architecture Overview Specification, revision 1.4, http://www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14, Aug., 2007.
- C. Linn and S. Debray, "Obfuscation of Executable Code to Improve Resistance to Static Disassembly," ACM CCS, Oct. 2003, DOI:10.1145/948109.948149.
- P. Barham et al., "Xen and the Art of Virtualization," ACM SOSP, Oct. 2003, DOI: 10.1145/1165389.945462
- A. Whitaker, M. Shaw, and S. D. Gribble, "Scale and Performance in the Denali Isolation Kernel," ACM OSDI, vol. 36, 2002, DOI:10.1145/844128.844147
- TCG, Mobile Trusted Module Specification, ver. 1.0, revision 6, http://www.trustedcomputinggroup.org/files/resource_files/87852F33-1D09-3519-AD0C0F141CC6B10D/Revision_6-tcg-mobile-trusted-module-1_0.pdf, June 2008.
- S. M. Lee, S. B. Suh, and B. Jeong, S. Mo, "A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization", IEEE Consumer Communications and Networking Conference, Jan. 2008, DOI:10.1109/ccnc08.2007.63
- J. Y. Hwang and S. B. Suh, "Xen-On-ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones," IEEE Consumer Communications and Networking Conference, Jan. 2008, DOI:10.1109/ccnc08.2007.64
- J. Azema and G, Fayad, "M-Shield Mobile Security Technology", http://focus.ti.com/pdfs/wtbu/ti_mshield_whitepaper.pdf, White Paper, Texas Instruments, 2008.
- NFC mobile service standard consortium, "Dynamic management of multi-application secure elements", http://members.nfc-forum.org/resources/white_papers/Stolpan_White_Paper_08.pdf, White Paper, 2008.
- R. Sailer, X. Zhang, T. Jeager, and L. Doorn, "Design and Implementation of a TCG-based Integrity Measurement Architecture", https://www.usenix.org/legacy/events/sec04/tech/full_pa pers/sailer/sailer.pdf, 13th USENIX Security Symposium, Aug. 2004.
- T. Garfinkel and B. Pfaff, "Terra: A Virtual Machine-Based Platform for Trusted Computing,'' ACM SOSP, 2003, DOI:10.1145/945445.945464
- Jung-Oh Park and Byung-Wook Jin, "A Study on Authentication Method for Secure Payment in Fintech Environment", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 15, No. 4, pp.25-31, Aug. 2015. https://doi.org/10.7236/JIIBC.2015.15.4.25
- Hwi-Min Choi, Chang-Bok Jang, Joo-Man Kim, Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM, DOI:10.14400/JDC.2014.12.10.299
- Young-Do Joo, "Security Improvements on Smart-Card Based Mutual Authentication Scheme", International Journal of Internet, Broadcasting and Communication, The Journal of The Institute of Webcasting, Internet and Telecommunication VOL. 12 No. 6, DOI:10.7236/JIWIT.2012.12.6.91