{"title":"基于行的端到端显示加密,用于安全文档","authors":"S. Burg, Pranav Channakeshava, O. Bringmann","doi":"10.1109/ISBA.2016.7477242","DOIUrl":null,"url":null,"abstract":"To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents.","PeriodicalId":198009,"journal":{"name":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Linebased end-to-display encryption for secure documents\",\"authors\":\"S. Burg, Pranav Channakeshava, O. Bringmann\",\"doi\":\"10.1109/ISBA.2016.7477242\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents.\",\"PeriodicalId\":198009,\"journal\":{\"name\":\"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISBA.2016.7477242\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISBA.2016.7477242","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Linebased end-to-display encryption for secure documents
To protect data against theft from Trojan horses, some of the common approaches like End-to-End Encryption fail to counter such malicious attempts as they do not account for vulnerabilities of the user's endpoint. Any data which is decrypted on the endpoint, can become visible to attackers. A technique that can prevent this dataloss is by employing encryption in the pixel-domain and using additional hardware to decrypt the graphics-stream. This is done by End-to-Display Encryption, which decrypts the data between the endpoint and the display, ensuring that the data-at-rest is always encrypted. In this paper, we present a linebased encryption method for a more user-friendly and improved End-to-Display Encryption design, which can be used to effectively counter corporate espionage by providing secure access to confidential documents.