Securing Smartphones: A Micro-TCB Approach
نویسندگان
چکیده
As mobile phones have evolved into ‘smartphones’, with complex operating systems running thirdparty software, they have become increasingly vulnerable to malicious applications (malware). We introduce a new design for mitigating malware attacks against smartphone users, based on a small trusted computing base module, denoted μTCB. The μTCB manages sensitive data and sensors, and provides core services to applications, independently of the operating system. The user invokes μTCB using a simple secure attention key, which is pressed in order to validate physical possession of the device and authorize a sensitive action; this protects private information even if the device is infected with malware. We present a proof-of-concept implementation of μTCB based on ARM’s TrustZone, a secure execution environment increasingly found in smartphones, and evaluate our implementation using simulations.
منابع مشابه
Leveraging a Minimal Trusted Computing Base for Securing On-Demand MANET Routing Protocols
We propose an approach to secure on-demand mobile ad hoc network (MANET) routing protocols by leveraging low-complexity trustworthy MANET modules (TMM). Such TMMs, which perform some trivial hard-wired functions involving simple logical and hash operations, can be realized at low cost. We describe the functionality of such TMMs to offer a sound trusted computing base (TCB) for securing MANETs. ...
متن کاملTrustworthy TCB for DNS Servers
A simple atomic relay function is proposed as a minimal trusted computing base (TCB) for a domain name system (DNS) server. This TCB, composed of a fixed sequence of logical and cryptographic hash operations, can be amplified to ensure that a DNS server cannot violate rules. The paper also outlines elements of a TCB-DNS protocol that amplifies the simple TCB to secure the domain name system. Th...
متن کاملSecure Cloud Micro Services Using Intel SGX
The micro service paradigm targets the implementation of large and scalable systems while enabling fine-grained service-level maintainability. Due to their scalability, such architectures are frequently used in cloud environments, which are often subject to privacy and trust issues hindering the deployment of services dealing with sensitive data. In this paper we investigate the integration of ...
متن کاملTrustDump: Reliable Memory Acquisition on Smartphones
With the wide usage of smartphones in our daily life, new malware is emerging to compromise the mobile OS and steal the sensitive data from the mobile applications. Anti-malware tools should be continuously updated via static and dynamic malware analysis to detect and prevent the newest malware. Dynamic malware analysis depends on a reliable memory acquisition of the OS and the applications run...
متن کاملApplication of a MABEL Approach for a T-Cell-Bispecific Monoclonal Antibody: CEA TCB.
CEA TCB is a novel T-cell-bispecific (TCB) antibody targeting the carcinoembryonic antigen (CEA) expressed on tumor cells and the CD3 epsilon chain (CD3e) present on T cells, which is currently in Phase 1 clinical trials (NCT02324257) for the treatment of CEA-positive solid tumors. Because the human CEA (hCEA) binder of CEA TCB does not cross-react with cynomolgus monkey and CEA is absent in ro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1401.7444 شماره
صفحات -
تاریخ انتشار 2014