K. Hussain, Sharon Rajan, Naveen Addulla, Ghada S. Moussa
{"title":"无捕获硬件功能,用于保护敏感信息","authors":"K. Hussain, Sharon Rajan, Naveen Addulla, Ghada S. Moussa","doi":"10.1109/ITCC.2005.212","DOIUrl":null,"url":null,"abstract":"Protecting sensitive information (credit card information, social security number... etc.) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulous hands. Despite tremendous advances in security, plenty of security problems still afflict systems. Existing security approaches do not prevent processes running in the background from capturing sensitive information on the screen. This paper proposes a no-capture hardware security feature that prevents capturing of sensitive data by users that have administration privileges.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"No-capture hardware feature for securing sensitive information\",\"authors\":\"K. Hussain, Sharon Rajan, Naveen Addulla, Ghada S. Moussa\",\"doi\":\"10.1109/ITCC.2005.212\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Protecting sensitive information (credit card information, social security number... etc.) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulous hands. Despite tremendous advances in security, plenty of security problems still afflict systems. Existing security approaches do not prevent processes running in the background from capturing sensitive information on the screen. This paper proposes a no-capture hardware security feature that prevents capturing of sensitive data by users that have administration privileges.\",\"PeriodicalId\":326887,\"journal\":{\"name\":\"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-04-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCC.2005.212\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCC.2005.212","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
No-capture hardware feature for securing sensitive information
Protecting sensitive information (credit card information, social security number... etc.) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulous hands. Despite tremendous advances in security, plenty of security problems still afflict systems. Existing security approaches do not prevent processes running in the background from capturing sensitive information on the screen. This paper proposes a no-capture hardware security feature that prevents capturing of sensitive data by users that have administration privileges.