Abstract—As the ARM architecture has become the favored platform for the fastest growing computing segment, the mobile market, establishing a sound security architecture on the platform is paramount. The frightening increase in malware for the Android and iOS platforms in addition to the adoption of ARM architectures outside of the mobile market only bolster this need. In this paper, we investigate the ARM architecture as well as its security and virtualization extensions available only on the newest generation of ARM processors. Considering these extensions, we present a concept for a multi-tiered security architecture for mobile computing devices. Our concept combines a custom TrustZone component and leverages the advanced features of the...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
ARM has become the leading processor architecture for mobile and IoT devices, while it has recently ...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
MasterIn the era of IoT (Internet of Things), embedded devices ranging from mobile devices, e.g. mob...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
In recent years, powerful handheld computing devices such as personal digital assistants and mobile ...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
ARM has become the leading processor architecture for mobile and IoT devices, while it has recently ...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
MasterIn the era of IoT (Internet of Things), embedded devices ranging from mobile devices, e.g. mob...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
During the past few years virtualization has strongly reemerged from the shadow of the mainframe gen...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...