Survivable Mobile Operating System
نویسندگان
چکیده
Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but breakdown with code mobility. In this paper, we investigate the need for endto-end security in mobile and wireless operating systems. We study the implication of mobility – specifically, ways in which the operating system may facilitate communication security. We suggest a framework for designing security into mobile devices by building encryption into the mobile device thus providing end-to-end security and eliminating carrier-provided encryption overhead.
منابع مشابه
Active Trust Management for Adaptive Survivable Systems (ATM for ASS’s)
The Problem: Computer systems are under attack as they have never been before. Every day computer systems around the world are compromised: data is stolen, security is breached, services are denied. These attacks are enabled by flaws in our current operating system, application code and middleware. It would be nice to replace all this with new software that is based on provably impenetrable tru...
متن کاملAFRL-OSR-VA-TR-2013-0164 Survivable Software
The Survivable Software framework (SSW), developed under award AFOSR FA955009-1-0481, uses a synergistic combination of (1) compiler-assisted, aspect-oriented program instrumentation, (2) software monitoring with overhead control, (3) runtime verification with state estimation, and (4) adaptive runtime verification to closely monitor high-criticality monitor instances, thereby increasing the pr...
متن کاملA Fast Strategy to Find Solution for Survivable Multicommodity Network
This paper proposes an immediately efficient method, based on Benders Decomposition (BD), for solving the survivable capacitated network design problem. This problem involves selecting a set of arcs for building a survivable network at a minimum cost and within a satisfied flow. The system is subject to failure and capacity restriction. To solve this problem, the BD was initially proposed with ...
متن کاملTopological Design of Survivable Wireless Access Networks
Wireless mobile networks have become crucial in providing untethered communication services to mobile users. In this paper, we propose an optimization model for the design of survivable wireless access networks. The main objective of the model is to optimize the network design cost of wireless backhaul networks while meeting survivability requirements. This paper also presents a simple and effi...
متن کاملExperimental demonstration of building and operating QoS-aware survivable vSD-EONs with transparent resiliency.
Software-defined elastic optical networks (SD-EONs) provide operators more flexibility to customize their optical infrastructures dynamically. By leveraging infrastructure-as-a-service (IaaS), virtual SD-EONs (vSD-EONs) can be realized to further enhance the adaptivity of SD-EONs and shorten the time-to-market of new services. In this paper, we design and demonstrate the building and operating ...
متن کامل