dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Zaidenberg, Nezer Jacob | |
dc.date.accessioned | 2023-04-27T05:32:13Z | |
dc.date.available | 2023-04-27T05:32:13Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Kiperberg, M., & Zaidenberg, N. J. (2023). HyperIO : A Hypervisor-Based Framework for Secure IO. <i>Applied Sciences</i>, <i>13</i>(9), Article 5232. <a href="https://doi.org/10.3390/app13095232" target="_blank">https://doi.org/10.3390/app13095232</a> | |
dc.identifier.other | CONVID_182923313 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/86637 | |
dc.description.abstract | Malware often attempts to steal input and output through human interface devices to obtain confidential information. We propose to use a thin hypervisor, called “HyperIO”, to realize a secure path between input and output devices using a partial implementation of device drivers. We apply our approach using two security systems built on HyperIO: FireSafe and ClipCrypt. FireSafe is a web browser extension which allows a remote web server to display and receive sensitive user information securely. ClipCrypt enables the user to securely enter and view their confidential information in commodity Windows applications. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | MDPI AG | |
dc.relation.ispartofseries | Applied Sciences | |
dc.rights | CC BY 4.0 | |
dc.subject.other | trusted path | |
dc.subject.other | virtualization | |
dc.subject.other | system security | |
dc.subject.other | browser security | |
dc.subject.other | malware protection | |
dc.title | HyperIO : A Hypervisor-Based Framework for Secure IO | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202304272738 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 2076-3417 | |
dc.relation.numberinseries | 9 | |
dc.relation.volume | 13 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2023 by the authors. Licensee MDPI, Basel, Switzerland. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | tietoverkot | |
dc.subject.yso | virtualisointi | |
dc.subject.yso | haittaohjelmat | |
dc.subject.yso | tietosuoja | |
dc.subject.yso | tietoturva | |
dc.subject.yso | järjestelmänhallinta | |
dc.subject.yso | tietojärjestelmät | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p12936 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p22009 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2837 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3636 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p23230 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3927 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.3390/app13095232 | |
jyx.fundinginformation | This research received no external funding. | |
dc.type.okm | A1 | |