Achieving Stronger SIM-lock and IMEI Implementations on Open Terminals using ARM TrustZone Technology
ثبت نشده
چکیده
Presently the concern over the security of mobile phones is driven by network operators wanting to stem the economic impact of losing subsidised terminals from their networks. Due to the vast price difference of products between subsidised and non-subsidised markets mobile terminals represent an attractive target to criminals. The result is that mobile terminals are under constant attack by hackers funded by organised crime. Governments and police forces also wish to see greater integrity of mobile phones to reduce the incidence of related crimes
منابع مشابه
The ANDIX research OS - ARM TrustZone meets industrial control systems security
Security by isolation is a longstanding, widely applied, and useful paradigm for achieving security goals such as data and code integrity, confidentiality, and availability. Security by isolation can be used to create Trusted Execution Environments. These environments provide specific security guarantees to the information processing taking place therein. In an Industrial Control System secure ...
متن کاملLTZVisor: TrustZone is the Key
Virtualization technology starts becoming more and more widespread in the embedded systems arena, driven by the upward trend for integrating multiple environments into the same hardware platform. The penalties incurred by standard software-based virtualization, altogether with the strict timing requirements imposed by real-time virtualization are pushing research towards hardware-assisted solut...
متن کاملDowngrade Attack on TrustZone
Security-critical tasks require proper isolation from untrusted software. Chip manufacturers design and include trusted execution environments (TEEs) in their processors to secure these tasks. The integrity and security of the software in the trusted environment depend on the verification process of the system. We find a form of attack that can be performed on the current implementations of the...
متن کاملUsing Trusted Execution Environments in Two-factor Authentication: comparing approaches
Classic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environment). A reason for this success are the stronger security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physically separate device. This paper investigates whether Trusted Ex...
متن کاملSecurity Technology for Smartphones
Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate information, and so on. Most smartphones use an open source operating system (OS), and anyone can obtain the OS source code; consequently, smartphone users are exposed to the threat of receiving fraudulent information from people with malicious intent. Aimed at count...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006