The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies 2008
DOI: 10.1145/1377836.1377862
|View full text |Cite
|
Sign up to set email alerts
|

Measuring integrity on mobile phone systems

Abstract: Mobile phone security is a relatively new field that is gathering momentum in the wake of rapid advancements in phone system technology. Mobile phones are now becoming sophisticated smart phones that provide services beyond basic telephony, such as supporting third-party applications. Such third-party applications may be security-critical, such as mobile banking, or may be untrusted applications, such as downloaded games. Our goal is to protect the integrity of such critical applications from potentially untru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 55 publications
(32 citation statements)
references
References 10 publications
0
31
0
1
Order By: Relevance
“…Traditional integrity models are not efficient and flexible under these scenarios. For example, LOMAC [20], UMIP [23], and CWlite [25] require a process dynamically downgrade its security level whenever it accesses low integrity objects or receives inputs from low integrity processes. However, the process needs to re-start whenever it needs to access high integrity objects later, which is not efficient for mobile devices.…”
Section: Secure Runtimementioning
confidence: 99%
See 4 more Smart Citations
“…Traditional integrity models are not efficient and flexible under these scenarios. For example, LOMAC [20], UMIP [23], and CWlite [25] require a process dynamically downgrade its security level whenever it accesses low integrity objects or receives inputs from low integrity processes. However, the process needs to re-start whenever it needs to access high integrity objects later, which is not efficient for mobile devices.…”
Section: Secure Runtimementioning
confidence: 99%
“…However, directly porting this to mobile devices is not practical due to its high computation overhead during booting and runtime. PRIMA [25] leverages the CW-lite information flow control to maintain a process's integrity, where particular interfaces of the process filter low integrity information when received by this process. However, identifying filtering interfaces in many service processes (daemons) on a mobile phone is not a easy task, especially many of them come from different software vendors, e.g., network carrier, device manufacturer, and third party service providers.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations