2008 IEEE Wireless Communications and Networking Conference 2008
DOI: 10.1109/wcnc.2008.553
|View full text |Cite
|
Sign up to set email alerts
|

On the Deployment of Mobile Trusted Modules

Abstract: Abstract-In its recently published TCG Mobile Reference Architecture, the TCG Mobile Phone Work Group specifies a new concept to enable trust into future mobile devices. For this purpose, the TCG devises a trusted mobile platform as a set of trusted engines on behalf of different stakeholders supported by a physical trust-anchor. In this paper, we present our perception on this emerging specification. We propose an approach for the practical design and implementation of this concept and how to deploy it to a t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 30 publications
(18 citation statements)
references
References 4 publications
0
18
0
Order By: Relevance
“…Note that we have designed the architecture in such a way that our technique would be able to use an mtm directly without any change to its working. We envision the deployment of our attestation technique probably as a separate trusted sub-system [28] that acts on behalf of either the service provider or the local owner of the device to provide attestation responses.…”
Section: Discussionmentioning
confidence: 99%
“…Note that we have designed the architecture in such a way that our technique would be able to use an mtm directly without any change to its working. We envision the deployment of our attestation technique probably as a separate trusted sub-system [28] that acts on behalf of either the service provider or the local owner of the device to provide attestation responses.…”
Section: Discussionmentioning
confidence: 99%
“…They do not provide means for protecting the cellular network from malicious behavior of the User Linux partition. Schmidt et al [25] describe how a trusted mobile platform can be built on a trustworthy platform. The authors employ the Turaya security kernel to run a virtualized legacy operating system (Linux) side-by-side with multiple trusted engines.…”
Section: Related Workmentioning
confidence: 99%
“…Further, it has been shown, that compartmentalised applications under a hypervisor are also suitable to implement platforms like MTM [29,9,21]. Such compartments are also easy to measure, enabling advanced security features, as shown by, e.g., TruWallet.…”
Section: Related Workmentioning
confidence: 99%