首页> 外文OA文献 >Securing Smartphones: A Micro-TCB Approach
【2h】

Securing Smartphones: A Micro-TCB Approach

机译:保护智能手机:micro-TCB方法

摘要

As mobile phones have evolved into `smartphones', with complex operatingsystems running third- party software, they have become increasingly vulnerableto malicious applications (malware). We introduce a new design for mitigatingmalware attacks against smartphone users, based on a small trusted computingbase module, denoted uTCB. The uTCB manages sensitive data and sensors, andprovides core services to applications, independently of the operating system.The user invokes uTCB using a simple secure attention key, which is pressed inorder to validate physical possession of the device and authorize a sensitiveaction; this protects private information even if the device is infected withmalware. We present a proof-of-concept implementation of uTCB based on ARM'sTrustZone, a secure execution environment increasingly found in smartphones,and evaluate our implementation using simulations.
机译:随着移动电话演变为具有运行第三方软件的复杂操作系统的“智能电话”,它们已变得越来越容易受到恶意应用程序(恶意软件)的攻击。我们引入了一种新的设计,该设计基于称为uTCB的小型可信计算库模块,可以缓解针对智能手机用户的恶意软件攻击。 uTCB独立于操作系统管理敏感数据和传感器,并为应用程序提供核心服务。用户使用一个简单的安全注意键调用uTCB,按下该键即可验证设备的物理所有权并授权敏感操作;即使设备感染了恶意软件,这也可以保护私人信息。我们提出了基于ARM'sTrustZone的uTCB的概念验证实施,这是智能手机中越来越多的安全执行环境,并使用仿真评估了我们的实施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号