Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms
نویسندگان
چکیده
Integrity measurement and attestation mechanisms have already been developed for PC and server platforms, however, porting these technologies directly on mobile and resource-limited devices does not truly satisfy their performance constraints. Therefore, there are ongoing research efforts on mobileefficient integrity measurement and attestation mechanisms. In this paper we propose a simple and efficient solution for this problem by considering the unique features of mobile phone devices. Our customized secure boot mechanism ensures that a platform can boot to a secure state. During runtime an information flow–based integrity model is leveraged to maintain high integrity status of the system. Our solution satisfies identified security goals of integrity measurement and attestation. We have implemented our solution on a LiMo compatible mobile
منابع مشابه
Implementation of a TCG-Based Trusted Computing in Mobile Device
Our implementation is aimed at estimating the possibility of employing TCG-based trusted computing mechanisms, such as verifying the code-integrity of executables and libraries at load-time and remote attestation, in mobile devices. Considering the restrained resource in mobile device, the experimentation shows promising results, thereby enabling these mechanisms to be used as a basic building ...
متن کاملModelling Dynamic Trust with Property Based Attestation in Trusted Platforms
Binary attestation in trusted computing provides the ability to reason about the state of a platform using integrity measurements. Property based attestation, an extension of binary attestation enables more meaningful attestation by abstracting low level binary values to high level security properties or functions of platforms. We believe that despite having trusted processes for integrity meas...
متن کاملA Direct Anonymous Attestation Scheme for Embedded Devices
Direct anonymous attestation (DAA) is an anonymous authentication scheme adopted by the Trusted Computing Group in its specifications for trusted computing platforms. This paper presents an efficient construction that implements all anonymous authentication features specified in DAA, including authentication with total anonymity, authentication with variable anonymity, and rogue TPM tagging. Th...
متن کاملThe Measurement of Low Frequency Magnetic Field of Two Kinds of GSM900 Mobile Phone
Introduction: The use of mobile communication systems has dramatically increased over the past decade. Although many studies have been performed to determine the effect of radio frequency (RF) but less attention has been paid to the possible biological impact of exposure to extremely low frequency (ELF) components. The objective of this study is two folds. One is to design the ...
متن کاملBeyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform
Increasing adoption of smartphones in recent times has begun to attract more and more malware writers towards these devices. Among the most prominent and widely adopted open source software stacks for smartphones is Android that comes with a strong security infrastructure for mobile devices. However, as with any remote platform, a service provider or device owner needs assurance that the device...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009