Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy 2020
DOI: 10.1145/3374664.3375748
|View full text |Cite
|
Sign up to set email alerts
|

TrustAV

Abstract: While the number of connected devices is constantly growing, we observe an increased incident rate of cyber attacks that target user data. Typically, personal devices contain the most sensitive information regarding their users, so there is no doubt that they can be a very valuable target for adversaries. Typical defense solution to safeguard user devices and data, are based in malware analysis mechanisms. To amortize the processing and maintenance overheads, the outsourcing of network inspection mechanisms to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…Matching via general crypto or MPC [80,81,169,205,296,303,333,349] (total: 9) Client-side or metadata-based [177,211,366,374] (total: 4) AI via MPC or federated learning [64,122,333,334] (total: 4) Matching in Trusted Execution Environment [95,350,372] (total: 3)…”
Section: Spam Filteringmentioning
confidence: 99%
“…Matching via general crypto or MPC [80,81,169,205,296,303,333,349] (total: 9) Client-side or metadata-based [177,211,366,374] (total: 4) AI via MPC or federated learning [64,122,333,334] (total: 4) Matching in Trusted Execution Environment [95,350,372] (total: 3)…”
Section: Spam Filteringmentioning
confidence: 99%