International audienceIn order to prevent attacks against smartphones and tablets, dedicated security applications can be deployed on the mobile devices themselves. However, these applications may have a significant impact on the device resources. Users may be tempted to uninstall or disable them with the objective of increasing battery lifetime and avoiding configuration operations and updates. In this paper, we propose a new approach for outsourcing mobile security functions and building transparent in-path security compositions for mobile devices. The outsourced functions are dynamically activated, configured and composed using software-defined networking and virtualization capabilities. We present a mathematical model to formalize the s...
Recently, mobile security has garnered considerable interest in both the research community and indu...
Abstract – Mobile devices are being considered as service platforms for mobile health information de...
Smartphone usage is on the rise and some may argue that these devices are ubiquitous in today\u27s s...
International audienceIn order to prevent attacks against smartphones and tablets, dedicated securit...
International audience—We present an approach for dynamically outsourc-ing and composing security fu...
International audienceNowadays, different types of electronic data transfer are supported by applica...
Smartphones offer functionalities to end users which were formerly only provided by personal compute...
The use of mobile devices has exponentially expanded in recent years. A device which was made with t...
Abstract Our daily lives are dominated by the use of smart phones. These gadgets, however, have dra...
In this paper, we propose a lightweight mechanism to isolate one or more Android userland instances ...
AbstractModern mobile devices, such as smartphones and tablets, have made many pervasive computing d...
The importance of researching in the field of smartphone security is substantiated in the increasing...
The problem of supporting the secure execution of potentially malicious third-party applications has...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
In current Bring-Your-Own-Device (BYOD) settings, companies struggle to assess and control the secur...
Recently, mobile security has garnered considerable interest in both the research community and indu...
Abstract – Mobile devices are being considered as service platforms for mobile health information de...
Smartphone usage is on the rise and some may argue that these devices are ubiquitous in today\u27s s...
International audienceIn order to prevent attacks against smartphones and tablets, dedicated securit...
International audience—We present an approach for dynamically outsourc-ing and composing security fu...
International audienceNowadays, different types of electronic data transfer are supported by applica...
Smartphones offer functionalities to end users which were formerly only provided by personal compute...
The use of mobile devices has exponentially expanded in recent years. A device which was made with t...
Abstract Our daily lives are dominated by the use of smart phones. These gadgets, however, have dra...
In this paper, we propose a lightweight mechanism to isolate one or more Android userland instances ...
AbstractModern mobile devices, such as smartphones and tablets, have made many pervasive computing d...
The importance of researching in the field of smartphone security is substantiated in the increasing...
The problem of supporting the secure execution of potentially malicious third-party applications has...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
In current Bring-Your-Own-Device (BYOD) settings, companies struggle to assess and control the secur...
Recently, mobile security has garnered considerable interest in both the research community and indu...
Abstract – Mobile devices are being considered as service platforms for mobile health information de...
Smartphone usage is on the rise and some may argue that these devices are ubiquitous in today\u27s s...