Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices 2011
DOI: 10.1145/2046614.2046622
|View full text |Cite
|
Sign up to set email alerts
|

Delivering secure applications on commercial mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 16 publications
1
8
0
Order By: Relevance
“…System-level virtualization of mobile devices has been proposed and implemented by both researchers [5,8,3] and commercial entities [6,12]. We agree with their conclusions that virtualization improves the security and manageability of mobile computing, and add our insight that virtualization would also enable seamless switching between devices.…”
Section: Related Worksupporting
confidence: 70%
See 1 more Smart Citation
“…System-level virtualization of mobile devices has been proposed and implemented by both researchers [5,8,3] and commercial entities [6,12]. We agree with their conclusions that virtualization improves the security and manageability of mobile computing, and add our insight that virtualization would also enable seamless switching between devices.…”
Section: Related Worksupporting
confidence: 70%
“…This paper proposes VMsync, a system for synchronizing the state of live virtual machines (VMs) among mobile devices. System-level VMs have been widely proposed to improve the security, manageability, and other aspects of mobile computing [3,5,6,8,12]. In the context of device switching, VMs encapsulate both data and computation state for a complete operating system and all its applications.…”
Section: Introductionmentioning
confidence: 99%
“…We did not expect this result, since the literature is abundant of solutions presenting hypervisors as a promising approach to improve system security [7,13,15]. In this paper, we showed that this approach inherently suffers from three main shortcomings.…”
Section: Discussionmentioning
confidence: 99%
“…For instance, the case of TrustZone is presented in [27] and that of bare-metal hypervisors is presented in [13]. Too often, authors assert the superiority of their solution without explicitly stating their evaluation criteria.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation