首页> 外文期刊>Security and communication networks >Protecting the integrity of trusted applications in mobile phone systems
【24h】

Protecting the integrity of trusted applications in mobile phone systems

机译:保护手机系统中可信应用程序的完整性

获取原文
获取原文并翻译 | 示例

摘要

Mobile phones have evolved into indispensable devices that run many exciting applications that users can download from phone vendor's application stores. However, as it is not practical to fully vet all application code, users may download malware-infected applications, which may steal or modify security-critical data. In this paper, we propose a security architecture for phone systems that protects trusted applications from such downloaded code. Our architecture uses reference monitors in the operating system and user-space services to enforce mandatory access control policies that express an approximation of Clark-Wilson integrity. In addition, we show how to justify the integrity of mobile phone applications by using the Policy Reduced Integrity Measurement Architecture (PRIMA), which enables a remote party to verify the integrity of applications running on a phone. We have implemented a prototype on the Openmoko Linux Platform, using an SELinux kernel with a PRIMA module and user-space services that leverage the SELinux user-level policy server. We find that the performance of enforcement and integrity measurement is satisfactory, and the SELinux reference policy can be reduced in size by 90% (although more reduction should be possible), enabling practical system integrity with a desirable usability model. Copyright © 2010 John Wiley & Sons, Ltd.
机译:手机已经发展成为运行许多令人兴奋的应用程序所不可或缺的设备,用户可以从手机供应商的应用程序商店中下载这些应用程序。但是,由于完全审查所有应用程序代码不切实际,因此用户可以下载感染了恶意软件的应用程序,这些应用程序可能会窃取或修改对安全至关重要的数据。在本文中,我们提出了一种电话系统的安全体系结构,该体系结构可保护受信任的应用程序免受此类下载代码的攻击。我们的体系结构使用操作系统和用户空间服务中的参考监视器来强制执行强制访问控制策略,这些策略表达了近似Clark-Wilson完整性。此外,我们还展示了如何使用降低策略完整性度量体系结构(PRIMA)来证明移动电话应用程序的完整性,该体系结构使远程方可以验证在电话上运行的应用程序的完整性。我们已经在Openmoko Linux平台上实现了一个原型,它使用带有PRIMA模块的SELinux内核和利用SELinux用户级策略服务器的用户空间服务。我们发现执行和完整性度量的性能令人满意,并且SELinux参考策略的大小可以减少90%(尽管应该有更多减少的可能),从而以理想的可用性模型实现实际的系统完整性。版权所有©2010 John Wiley&Sons,Ltd.

著录项

  • 来源
    《Security and communication networks》 |2011年第6期|p.633-650|共18页
  • 作者单位

    Systems and Internet Infrastructure Security Lab, The Pennsylvania State University, University Park, PA 16802 U.S.A.;

    Systems and Internet Infrastructure Security Lab, The Pennsylvania State University, University Park, PA 16802 U.S.A.;

    Systems and Internet Infrastructure Security Lab, The Pennsylvania State University, University Park, PA 16802 U.S.A.;

    Systems and Internet Infrastructure Security Lab, The Pennsylvania State University, University Park, PA 16802 U.S.A.;

    Systems and Internet Infrastructure Security Lab, The Pennsylvania State University, University Park, PA 16802 U.S.A.;

    Systems and Internet Infrastructure Security Lab, The Pennsylvania State University, University Park, PA 16802 U.S.A;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    mobile phones; integrity measurement; clark-wilson integrity; mandatory access control; reference monitor; selinux;

    机译:手机;完整性测量;克拉克-威尔逊诚信;强制访问控制;参考监控器;selinux;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号