2008 5th IEEE Consumer Communications and Networking Conference 2008
DOI: 10.1109/ccnc08.2007.63
|View full text |Cite
|
Sign up to set email alerts
|

A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization

Abstract: In this paper we present a multi-layer mandatory access control mechanism (ACM) for mobile devices based on system virtualization technology. We discuss a detailed threat model to mobile devices in the real world to develop an ACM fitted to mobile devices. Then, we propose a novel multi-layer access control mechanism for mobile devices, which provides strong protection against the identified mobile threats as well as performance efficiency. Our Virtual Machine Monitor (VMM) and secure domain have independent a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2009
2009
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…To enhance the security of this virtualized environment, access control mechanism has been deployed in the VMM or hypervisor to authorize the permission of an access to the hardware resource. The main difference between this approach and ours is that we leverage the virtualization to offer secure service not to confine the compromised system to the infected domain [7,8].…”
Section: Standalone Modementioning
confidence: 98%
“…To enhance the security of this virtualized environment, access control mechanism has been deployed in the VMM or hypervisor to authorize the permission of an access to the hardware resource. The main difference between this approach and ours is that we leverage the virtualization to offer secure service not to confine the compromised system to the infected domain [7,8].…”
Section: Standalone Modementioning
confidence: 98%
“…The SRM first decompresses the software package and verifies it. In [2,5], the Domain0 was not allowed to install unauthorized software to be kept secure. In this situation, our software installer verifies the digital signature of the downloaded software.…”
Section: B Proposed Architecturementioning
confidence: 99%
“…Currently, Xen [8,9], one of popular virtualization technologies, has been adopted for CE devices. Secure Xen on ARM [1,2,3,4,5] made a large contribution toward supporting secure computing environment for mobile devices by executing multiple domains on the basis of strong isolation of Virtual Machine Monitor (VMM) on ARM processor. However, there have been no efforts to provide an effective windowing system for CE devices running multiple domains by using VMM.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Some work has been done on smartphone access control [8]. But their focus is on the security of applications installed on smartphones.…”
Section: Related Workmentioning
confidence: 99%