Towards an Open Ecosystem for Embedded Tamper Resistant Hardware in Mobile Devices

نویسنده

  • Michael Hölzl
چکیده

Copyright is held by the author/owner(s). UbiComp ’13 Adjunct, Sept 8-12, 2013, Zurich, Switzerland. ACM 978-1-4503-2139-6/13/09...$15.00. Abstract Insu cient security and privacy level on mobile devices, have made it di cult to utilize sensitive systems like mobile banking, mobile credit cards, mobile ticketing or mobile passports. Solving these challenges in security and privacy, could provide a potential future for such systems towards better mobility and higher confidence level of end-user services. We address this issue by introducing an open ecosystem for mobile applications on tamper resistant hardware. A transparent integration of security features of such hardware will allow security critical applications to securely store and read data, transfer data to servers and securely communicate with other hardware parts (e.g. touch screen, sensors, etc.). In this research we will investigate variants and analyse trade-o↵s of integrating such an interface.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote veri...

متن کامل

Tamper-resistant ubiquitous data management

The rapid growth of ubiquitous computing impels mobile users to store personal data on the Web in order to increase data availability and facilitate data sharing among partners. However, Database Service Providers (DSP) arouse user’s suspicion because DSP’s privacy policies have been frequently dishonored [AKS02]. In addition, no one can fully trust traditional server-based security mechanisms ...

متن کامل

Relative Study in Architecture and Design Methodologies for Secured Real Time Embedded Systems

The embedded systems field is growing rapidly,with devices such as cellular phones, PDAs, smart cards, and digital music players permeating society. On the horizon are futuristic technologies such as embedded network sensors and wearable computers, which promise even greater interaction between humans and machines. As embedded devices are increasingly integrated into personal and commercial inf...

متن کامل

A Practical Hardware-Assisted Approach to Customize Trusted Boot for Mobile Devices

Current efforts to increase the security of the boot sequence for mobile devices fall into two main categories: (i) secure boot: where each stage in the boot sequence is evaluated, aborting the boot process if a non expected component attempts to be loaded; and (ii) trusted boot: where a log is maintained with the components that have been loaded in the boot process for later audit. The first a...

متن کامل

Sécurisation du contrôle d'accès pour des documents XML. (A Secure Access Controller for XML Documents)

The erosion of trust put in traditional database servers and in Database ServiceProviders and the growing interest for different forms of selective data dissemination aredifferent factors that lead to move the access control from servers to clients. Different dataencryption and key dissemination schemes have been proposed to serve this purpose. Bycompiling the access control rul...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013