Trustworthy Execution on Mobile Devices

Trustworthy Execution on Mobile Devices

4.11 - 1251 ratings - Source

This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed strengthen the security properties available to applications and users, without reducing the properties currently enjoyed by OEMs and network carriers. Finally, this brief makes recommendations for future research that may yield practical and deployable results.The model used by this API supports code modules that perform operations on the stored credential rather than releasing them directly, which ... Remote attestation allows remote parties to verify that a particular message originated from a particular software module. ... A remote party, such as an online banking service, could use this information, if it knew a list of valid OS kernel identities and a list of validanbsp;...

Title:Trustworthy Execution on Mobile Devices
Author: Amit Vasudevan, Jonathan M. McCune, James Newsome
Publisher:Springer Science & Business Media - 2013-08-13

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA