Trustworthy Execution on Mobile Devices: What Security Properties Can My Mobile Platform Give Me?
نویسندگان
چکیده
We are now in the post-PC era, yet our mobile devices are insecure. We consider the different stake-holders in today’s mobile device ecosystem, and analyze why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. We systematize existing proposals for leveraging such primitives, and show that they can indeed strengthen the security properties available to applications and users, all without reducing the properties currently enjoyed by OEMs and network carriers. We also highlight shortcomings of existing proposals and make recommendations for future research that may yield practical, deployable results.
منابع مشابه
Memory-Constrained Security Enforcement
With the proliferation of mobile, wireless and internet-enabled devices (e.g., PDAs, cell phones, pagers, etc.), Java is emerging as a standard execution environment due to its security, portability, mobility and network support features. The platform of choice in this setting is Java ME-CLDC. With the large number of applications available for Javaenabled network-connected devices, security is...
متن کاملAnalyzing Trusted Elements in Mobile Devices
Since last two decades, we have witnessed a significant trend from PC to mobile devices. The primary focus of this shift on mobile devices is making a device personal to the user, but, unfortunately, neglecting the trustworthiness of mobile devices. Mobile devices consist of many elements in hardware, software (firmware) and a combination of both. Some of these elements on mobile devices are tr...
متن کاملPerformance Analysis of Security Mechanism during Handoff in Mobile Ip
I have examined the final copy of this thesis for form and content, and recommend that it be accepted in partial fulfillment of the requirements for the degree of Master of Science with a major in Electrical and Computer Engineering. iv DEDICATION This thesis is dedicated to my beloved parents, all my family members and friends who have supported and encouraged me throughout my life. Without th...
متن کاملA fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
With fast evolution of mobile devices and mobile network, the need of protecting user sensitive information locally and performing secure user authentication remotely become evermore increasing. Bio-cryptography is emerging as a powerful solution which can combine the advantages of conventional cryptography and biometric security. In this paper, we present an efficient bio-cryptographic securit...
متن کاملA secure XML based synchronization scheme for mobile devices
Acknowledgments First of all, I would like to express my sincere gratitude to my supervisor, Professor Andreas Pitsillides, for his constant support all these years and for giving me the opportunity to participate in several interesting research projects and attend various international conferences. His help was valuable to finish this thesis work. I would also like to thank my fiancée and my f...
متن کامل