Security Technology for Smartphones
نویسندگان
چکیده
Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate information, and so on. Most smartphones use an open source operating system (OS), and anyone can obtain the OS source code; consequently, smartphone users are exposed to the threat of receiving fraudulent information from people with malicious intent. Aimed at countering this threat, safe smartphones—on which information is protected by applying multiple technologies such as Secure Boot, Linux Security Module, and TrustZoneTM—are marketed. Secure Boot is a technology for detecting whether a boot program of a smartphone has been rewritten and protects network-operator information by making it impossible to start up programs modified by a third party. Linux Security Module prevents leaks of personal information by controlling access to information by any program installed after factory shipment and by stopping unauthorized access to that information. TrustZone ensures banking services are safe by separating program operating environments with hardware and by preventing unauthorized access to information by programs running on open source OSs. In this report, these technologies, namely, Secure Boot, Linux Security Module, and TrustZone, are described in detail.
منابع مشابه
Intrusion Detection on Smartphones
Smartphone technology is more and more becoming the predominant communication tool for people across the world. People use their smartphones to keep their contact data, to browse the internet, to exchange messages, to keep notes, carry their personal files and documents, etc. Users while browsing are also capable of shopping online, thus provoking a need to type their credit card numbers and se...
متن کاملSmartphone Security by Cloud Computing
Smartphone usage has been continuously growing in recent times. Smartphones offer Personal Computer (PC) functionality to the end user, hence they are vulnerable to the same sorts of security threats as desktop computers. Cloud computing is a new computing paradigm and a breakthrough technology of recent times. Its growing popularity can be attributed to its ability to transform computing to a ...
متن کاملBiometrics and Security in Smartphones
In this paper we look at the significance of biometrics, specifically fingerprint readers which have been implemented into smartphones, primarily the iPhone 5S. The security of the technology is presented and analyzed while the security breaches and hacks are demonstrated in detail. We look at secure options in Android vs. iOS. And we also look at the future of biometrics and soon to be wearabl...
متن کاملAn Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones
Smartphones are widely used today and their popularity will certainly not slow down in the near future due to improved functionality and new technology improvements. Becoming more and more similar to PCs and laptops, they will also begin to face the same security problems especially in terms of network security. In a previous paper, we have provided a detailed analysis of security issues along ...
متن کاملAn Overview of Threats and Security Software Solutions for Smartphones
The market of security software solutions for smartphones has grown considerably in the last years. A wide range of products is available. The objective of our paper is to develop an overview of security software solutions for smartphones. At first we identify typical threats and security measures for smartphones. Then we explore current security software solutions and describe how these can be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013