In this paper, we propose a lightweight mechanism to isolate one or more Android userland instances from a trustworthy and secure entity. This entity controls and manages the Android instances and provides an interface for remote administration and management of the device and its software. Our approach includes several security extensions for secure network access, integrity protection of data on storage devices, and secure access to the touchscreen. Our implementation requires only minimal modification to the software stack of a typical Android-based smartphone, which allows easy porting to other devices when compared to other virtualization techniques. Practical tests show the feasibility of our approach regarding runtime overhead and ba...
Mobile virtualization has emerged fairly recently and is considered a valuable way to mitigate secur...
Although many approaches have been proposed to protect mobile privacy through techniques such as iso...
Several nice hardware functionalities located at the low level of operating system on mobile phones ...
International audienceAndroid is one of the most popular operating systems on mobile devices, and it...
In this paper, we introduce a security framework for practical and lightweight domain isolation on A...
In this paper, we introduce a security framework for practical and lightweight domain isolation on A...
In this paper, we introduce a security framework for practical and lightweight domain isolation on A...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
Android is the most popular mobile operating system nowadays both for smartphones and tablets. This ...
Android's underlying Linux kernel is rapidly becoming an attractive target for attackers. In 2014, t...
The use of the Android operating system has become a very popular option with a vast variety of mobi...
Nowadays, smartphones and tablets are replacing the personal computer for the average user. As more ...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Virtualization technology is used to manage computing resources in smart phones as well as desktops....
Mobile virtualization has emerged fairly recently and is considered a valuable way to mitigate secur...
Although many approaches have been proposed to protect mobile privacy through techniques such as iso...
Several nice hardware functionalities located at the low level of operating system on mobile phones ...
International audienceAndroid is one of the most popular operating systems on mobile devices, and it...
In this paper, we introduce a security framework for practical and lightweight domain isolation on A...
In this paper, we introduce a security framework for practical and lightweight domain isolation on A...
In this paper, we introduce a security framework for practical and lightweight domain isolation on A...
Smart mobile devices, such as smartphones and tablets, have become an integral part of our daily per...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
Android is the most popular mobile operating system nowadays both for smartphones and tablets. This ...
Android's underlying Linux kernel is rapidly becoming an attractive target for attackers. In 2014, t...
The use of the Android operating system has become a very popular option with a vast variety of mobi...
Nowadays, smartphones and tablets are replacing the personal computer for the average user. As more ...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Virtualization technology is used to manage computing resources in smart phones as well as desktops....
Mobile virtualization has emerged fairly recently and is considered a valuable way to mitigate secur...
Although many approaches have been proposed to protect mobile privacy through techniques such as iso...
Several nice hardware functionalities located at the low level of operating system on mobile phones ...