How Secure are Current Mobile Operating Systems?
نویسندگان
چکیده
There are numerous initiatives to use mobile devices as so-called “trusted pocket signers” to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating system used on the mobile device has thus a pivotal importance to ensure the integrity and accountability of the electronic signature. Also mobile devices are used to provide mobile workers with access to the corporate backend. We examined the currently available mobile operating systems in regard to their security and conclude that not a single one is secure enough for “trusted” signing and only partially for secure backend access. We show two possible ways of how to make mobile devices more secure and possibly to enable something close to “what you see is what you sign”.
منابع مشابه
Securing the Access to Electronic Health Records on Mobile Phones
Mobile phones are increasingly used in the e-health domain. In this context, enabling secure access to health records from mobile devices is of particular importance because of the high security and privacy requirements for sensitive medical data. Standard operating systems and software, as they are deployed on current smartphones, cannot protect sensitive data appropriately, even though modern...
متن کاملConstructing secure mobile agent systems using the agent operating system
Designing a secure and reliable mobile agent system is a difficult task. The agent operating system (AOS) is a building block that simplifies this task. AOS provides common primitives required by most mobile agent middleware systems, such as primitives for secure communication, secure and tamper-evident agent packaging and agent migration. Different middleware processes can use AOS at the same ...
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملA Security Architecture for Accessing Health Records on Mobile Phones
Using mobile phones to access healthcare data is an upcoming application scenario of increasing importance in the near future. However, important aspects to consider in this context are the high security and privacy requirements for sensitive medical data. Current mobile phones using standard operating systems and software cannot offer appropriate protection for sensitive data, although the har...
متن کاملLaying a Secure Foundation for Mobile Devices
Presentation: Modern mobile devices such as smartphones and tablets have become fully general computing systems with a rich third party application ecosystem and user experience. As such, the same security problems that have long plagued the personal computer (PC) industry are becoming increasingly evident on mobile devices. Addressing these threats effectively requires a secure foundation, inc...
متن کامل