Security Technology for Smartphones

نویسندگان

  • Yasuhiko Abe
  • Hitoshi Ikeda
  • Masafumi Emura
چکیده

Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate information, and so on. Most smartphones use an open source operating system (OS), and anyone can obtain the OS source code; consequently, smartphone users are exposed to the threat of receiving fraudulent information from people with malicious intent. Aimed at countering this threat, safe smartphones—on which information is protected by applying multiple technologies such as Secure Boot, Linux Security Module, and TrustZoneTM—are marketed. Secure Boot is a technology for detecting whether a boot program of a smartphone has been rewritten and protects network-operator information by making it impossible to start up programs modified by a third party. Linux Security Module prevents leaks of personal information by controlling access to information by any program installed after factory shipment and by stopping unauthorized access to that information. TrustZone ensures banking services are safe by separating program operating environments with hardware and by preventing unauthorized access to information by programs running on open source OSs. In this report, these technologies, namely, Secure Boot, Linux Security Module, and TrustZone, are described in detail.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Detection on Smartphones

Smartphone technology is more and more becoming the predominant communication tool for people across the world. People use their smartphones to keep their contact data, to browse the internet, to exchange messages, to keep notes, carry their personal files and documents, etc. Users while browsing are also capable of shopping online, thus provoking a need to type their credit card numbers and se...

متن کامل

Smartphone Security by Cloud Computing

Smartphone usage has been continuously growing in recent times. Smartphones offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. Cloud computing is a new computing paradigm and a breakthrough technology of recent times. Its growing popularity can be attributed to its ability to transform computing to a ...

متن کامل

Biometrics and Security in Smartphones

In this paper we look at the significance of biometrics, specifically fingerprint readers which have been implemented into smartphones, primarily the iPhone 5S. The security of the technology is presented and analyzed while the security breaches and hacks are demonstrated in detail. We look at secure options in Android vs. iOS. And we also look at the future of biometrics and soon to be wearabl...

متن کامل

An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones

Smartphones are widely used today and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security. In a previous paper, we have provided a detailed analysis of security issues along ...

متن کامل

An Overview of Threats and Security Software Solutions for Smartphones

The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013