Achieving Stronger SIM-lock and IMEI Implementations on Open Terminals using ARM TrustZone Technology

ثبت نشده
چکیده

Presently the concern over the security of mobile phones is driven by network operators wanting to stem the economic impact of losing subsidised terminals from their networks. Due to the vast price difference of products between subsidised and non-subsidised markets mobile terminals represent an attractive target to criminals. The result is that mobile terminals are under constant attack by hackers funded by organised crime. Governments and police forces also wish to see greater integrity of mobile phones to reduce the incidence of related crimes

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The ANDIX research OS - ARM TrustZone meets industrial control systems security

Security by isolation is a longstanding, widely applied, and useful paradigm for achieving security goals such as data and code integrity, confidentiality, and availability. Security by isolation can be used to create Trusted Execution Environments. These environments provide specific security guarantees to the information processing taking place therein. In an Industrial Control System secure ...

متن کامل

LTZVisor: TrustZone is the Key

Virtualization technology starts becoming more and more widespread in the embedded systems arena, driven by the upward trend for integrating multiple environments into the same hardware platform. The penalties incurred by standard software-based virtualization, altogether with the strict timing requirements imposed by real-time virtualization are pushing research towards hardware-assisted solut...

متن کامل

Downgrade Attack on TrustZone

Security-critical tasks require proper isolation from untrusted software. Chip manufacturers design and include trusted execution environments (TEEs) in their processors to secure these tasks. The integrity and security of the software in the trusted environment depend on the verification process of the system. We find a form of attack that can be performed on the current implementations of the...

متن کامل

Using Trusted Execution Environments in Two-factor Authentication: comparing approaches

Classic two-factor authentication has been around for a long time and has enjoyed success in certain markets (such as the corporate and the banking environment). A reason for this success are the stronger security properties, particularly where user interaction is concerned. These properties hinge on a security token being a physically separate device. This paper investigates whether Trusted Ex...

متن کامل

Security Technology for Smartphones

Service functions are implemented on smartphones by storing on them personal information, network-operator information, corporate information, and so on. Most smartphones use an open source operating system (OS), and anyone can obtain the OS source code; consequently, smartphone users are exposed to the threat of receiving fraudulent information from people with malicious intent. Aimed at count...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006