Security threats on consumer devices such as mobile phones are increasing as the software platforms become more open and complex. Therefore, hypervisors, which bring potential new secure services to embedded systems, are becoming increasingly important. In this paper, we look into how to design a hypervisor-based security architecture for an advanced mobile phone. Key security components of the architecture have been verified through a hypervisor implemented on an emulated ARM platform. We compare the hypervisor security architecture with TrustZone and summarize the major benefits and limitations of the hypervisor approach. In short, hypervisors exhibit several advantages such as support of multiple secure execution domains and monitoring o...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
Android's underlying Linux kernel is rapidly becoming an attractive target for attackers. In 2014, t...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...
Security threats on consumer devices such as mobile phones are increasing as the software platforms ...
Abstract—Security threats on consumer devices such as mobile phones are increasing as the software p...
Abstract—As the ARM architecture has become the favored platform for the fastest growing computing s...
With the advent of the mobile industry, we face new security challenges. ARM architecture is deploye...
Mobile devices such as smartphones are becoming the majority of computing devices due to their evolv...
Security by virtualization in mobile devices is more and more relevant after the recent issues revea...
Android's underlying Linux kernel is rapidly becoming an attractive target for attackers. In 2014, t...
The arrival of smart phones has created the new era in communication between users and internet. Sma...
Virtualization has grown increasingly popular, thanks to its benefits of isolation, management, and ...
There is a raise in penetration of smart phone while using enterprise application, as most of them a...
MasterAs mobile technology matures, mobile devices (principally smart phones and tablets) are increa...
This paper proposes a novel design to enable the virtualization of both secure and non-secure worlds...
Mobile phones became the prevailing application in embedded devices. As its market is getting bigger...
MasterAs the embedded system is applied in various fields, the rate of use of smart devices such as ...
Today's mobile devices are equipped with sophis-ticated chain-of-trust mechanisms, able to successfu...