DocumentCode :
111250
Title :
Securing Smartphones: A µTCB Approach
Author :
Gilad, Yossi ; Herzberg, Amir ; Trachtenberg, Ari
Author_Institution :
Bar-Ilan Univ., Ramat-Gan, Israel
Volume :
13
Issue :
4
fYear :
2014
fDate :
Oct.-Dec. 2014
Firstpage :
72
Lastpage :
79
Abstract :
As mobile phones have evolved into smartphones, with complex operating systems running third-party software, they have become increasingly vulnerable to malicious applications (malware). The authors introduce a new design for mitigating malware attacks against smartphone users based on a small trusted computing base module, denoted μTCB. The μTCB manages sensitive data and sensors and provides core services to applications, independently of the operating system. The user invokes μTCB by pressing a simple secure attention key that validates physical possession of the device and authorizes a sensitive action. This approach protects private information even if the device is infected with malware. This article presents a proof-of-concept implementation of μTCB based on ARM´s TrustZone, a secure execution environment increasingly found in smartphones. It also includes an evaluation of the implementation using simulations.
Keywords :
invasive software; mobile computing; smart phones; trusted computing; μTCB approach; ARM TrustZone; complex operating systems; core services; malicious applications; malware attacks; mobile phones; operating system; physical possession; proof-of-concept implementation; securing smartphones; sensitive action; trusted computing base module; Computer architecture; Cryptography; Malware; Mobile communication; Mobile handsets; Smart phones; mobile; pervasive computing; security; security kernels; invasive software; smartphones; trusted physical interfaces;
fLanguage :
English
Journal_Title :
Pervasive Computing, IEEE
Publisher :
ieee
ISSN :
1536-1268
Type :
jour
DOI :
10.1109/MPRV.2014.72
Filename :
6926719
Link To Document :
بازگشت