DocumentCode :
2943135
Title :
A Trusted Mobile Phone Prototype
Author :
Aciicmez, O. ; Latifi, A. ; Seifert, J.-P. ; Xinwen Zhang
Author_Institution :
Samsung Electron. R&D Center, San Jose
fYear :
2008
fDate :
10-12 Jan. 2008
Firstpage :
1208
Lastpage :
1209
Abstract :
Due to the increasing security demands in mobile devices, the Trusted Computing Group (TCG) formed a dedicated Mobile Phone Working Group (MPWG) to address these security needs. MPWG recently released a Trusted Mobile Phone Reference Architecture (TCG-MPRA) specification that integrates well-known security concepts (TPM, isolation, Integrity Measurement and Verification (IMV), etc.) from the trusted" PC universe, tailored for mobile phones. The business needs of the mobile phone industry mandate 4 different stakeholders (platform owners): device "manufacturer, cellular service provider, general service provider, and the end-user. The specification requires separate trusted and isolated operational domains (Trusted Engines) for each stakeholder. Although the TCG MPWG does not explicitly prescribe a specific technical realization of these trusted engines, a general consensus is use of established (Trusted) Virtualization concepts from corresponding PC architectures. However, we will demo another isolation technique specifically crafted for mobile platforms that respects their resource limitations. We achieve this goal by realizing the MPWG specification by leveraging SELinux which provides a generic domain isolation concept at the kernel level. In addition to utilizing SELinux to realize mobile phone specific (isolated) operational domains, we are also able to seamlessly integrate the important IMV concept into our SELinux-based Trusted Mobile Phone architecture. In our demo we will present a hardware prototvpe, representing a generic mobile phone, implementing the TCG MPWG specification. First, we will "Securely Boot" our TC-aware SELinux kernel out of a hardware Mobile Trusted Module (MTM). Next, we will show how easy and efficient we can realize the 4 isolated Trusted Engines. The value of the Trusted Engines and the fundamental IMV principle will be demonstrated through successful mitigation of two automatic Linux cell-phone worms. The prototype in this demo is i- effect, the world\´s first novel, efficient and inherently secure implementation of MPWG specification.
Keywords :
Linux; cellular radio; mobile handsets; telecommunication computing; PC architecture; TC-aware SELinux kernel; automatic Linux cell-phone worm; hardware mobile trusted module; mobile phone working group; trusted computing group; trusted mobile phone prototype; trusted mobile phone reference architecture; virtualization concept; Computer architecture; Engines; Hardware; Kernel; Linux; Manufacturing industries; Mobile computing; Mobile handsets; Prototypes; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-1456-7
Electronic_ISBN :
978-1-4244-1457-4
Type :
conf
DOI :
10.1109/ccnc08.2007.270
Filename :
4446568
Link To Document :
بازگشت