2012 21st International Conference on Computer Communications and Networks (ICCCN) 2012
DOI: 10.1109/icccn.2012.6289217
|View full text |Cite
|
Sign up to set email alerts
|

A Smartphone Security Architecture for App Verification and Process Authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…A security architecture for Linux based smartphones that provides a runtime integrity measurement system proposed in [37]. The proposed architecture relies on a Mobile Trusted Module (MTM) which would only allow applications to run on the smartphone which have been signed by the MTM and would check pre-exisisting applications for modification.…”
Section: Securing Android Applicationsmentioning
confidence: 99%
“…A security architecture for Linux based smartphones that provides a runtime integrity measurement system proposed in [37]. The proposed architecture relies on a Mobile Trusted Module (MTM) which would only allow applications to run on the smartphone which have been signed by the MTM and would check pre-exisisting applications for modification.…”
Section: Securing Android Applicationsmentioning
confidence: 99%
“…We assume a system where the problems of establishing trust in the mobile device, operating system and associated drivers, and the mobile client are already addressed. This includes for instance a system where a a chain of trust has been established [45], [23], [60]. The chain of trust ensures that the operating system, including the camera and sensor device drivers, and the installed apps, are trusted and have not been tampered with by an attacker, see e.g., [4], [6].…”
Section: A System Modelmentioning
confidence: 99%