DocumentCode :
3128892
Title :
Are there good reasons for protecting mobile phones with hypervisors?
Author :
Gehrmann, Christian ; Douglas, Heradon ; Nilsson, Dennis Kengo
Author_Institution :
Swedish Inst. of Comput. Sci. (SICS), Kista, Sweden
fYear :
2011
fDate :
9-12 Jan. 2011
Firstpage :
906
Lastpage :
911
Abstract :
Security threats on consumer devices such as mobile phones are increasing as the software platforms become more open and complex. Therefore, hypervisors, which bring potential new secure services to embedded systems, are becoming increasingly important. In this paper, we look into how to design a hypervisor-based security architecture for an advanced mobile phone. Key security components of the architecture have been verified through a hypervisor implemented on an emulated ARM platform. We compare the hypervisor security architecture with TrustZone and summarize the major benefits and limitations of the hypervisor approach. In short, hypervisors exhibit several advantages such as support of multiple secure execution domains and monitoring of non-trusted domains; however, this comes at the cost of larger legacy system porting efforts.
Keywords :
mobile handsets; security; hypervisor-based security architecture; legacy system porting efforts; mobile phones; security threats; Computer architecture; Hardware; Kernel; Mobile communication; Mobile handsets; Security; Virtual machine monitors;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-8789-9
Type :
conf
DOI :
10.1109/CCNC.2011.5766638
Filename :
5766638
Link To Document :
بازگشت