Security threats on consumer devices such as mobile phones are increasing as the software platforms become more open and complex. Therefore, hypervisors, which bring potential new secure services to embedded systems, are becoming increasingly important. In this paper, we look into how to design a hypervisor-based security architecture for an advanced mobile phone. Key security components of the architecture have been verified through a hypervisor implemented on an emulated ARM platform. We compare the hypervisor security architecture with TrustZone and summarize the major benefits and limitations of the hypervisor approach. In short, hypervisors exhibit several advantages such as support of multiple secure execution domains and monitoring o...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Abstract—This paper addresses an essential application of microkernels; its role in virtualization f...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
Android's underlying Linux kernel is rapidly becoming an attractive target for attackers. In 2014, t...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Abstract—This paper addresses an essential application of microkernels; its role in virtualization f...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
Android's underlying Linux kernel is rapidly becoming an attractive target for attackers. In 2014, t...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Abstract—This paper addresses an essential application of microkernels; its role in virtualization f...