Browse > Article
http://dx.doi.org/10.14400/JDC.2014.12.10.299

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM  

Choi, Hwi-Min (Dept. of IT Engineering, Pusan National University)
Jang, Chang-Bok (R2soft co., LTD.)
Kim, Joo-Man (Dept. of IT Engineering, Pusan National University)
Publication Information
Journal of Digital Convergence / v.12, no.10, 2014 , pp. 299-308 More about this Journal
Abstract
Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.
Keywords
Mobile Virtualization; Trustzone; Mobile Security; GlobalPlatform;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Trusted Computing Group, TCG Specification Architecture Overview Specification, revision 1.4, Aug., 2007.
2 P. Barham et al., "Xen and the Art of Virtualization," ACM SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164-177, Oct. 2003.
3 TCG, Mobile Trusted Module Specification, ver. 1.0, revision 6, June 2008.
4 S. M. Lee, S. B. Suh, and B. Jeong, S. Mo, "A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization," IEEE Consumer Communications and Networking Conference, pp. 251-256, Jan. 2008.
5 J. Y. Hwang and S. B. Suh, "Xen-On-ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones," IEEE Consumer Communications and Networking Conference, pp. 257-161, Jan. 2008.
6 NFC mobile service standard consortium, "Dynamic management of multi-application secure elements," White Paper, 2008.
7 R. Sailer, X. Zhang, T. Jeager, and L. Doorn, "Design and Implementation of a TCG-based Integrity Measurement Architecture," 13th USENIX Security Symposium, Vol. 13, Aug. 2004.
8 T. Garfinkel and B. Pfaff, "Terra: A Virtual Machine-Based Platform for Trusted Computing,'' SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles, Vol. 37, No. 5, pp. 193-206, 2003.
9 http://www.samsung.com/global/business/mobile/solution/security/samsung-knox
10 http://searchmobilecomputing.techtarget.com/definition/mobile-device-management
11 ARM Security Technology : Building a Secure System using TrustZone Technology, April 2009, ARM
12 TrustZone API Specification Version 3.0, February 2009, ARM
13 Changbok Jang, Euiin Choi, "Context Model Based on Ontology in Mobile Cloud Computing", Communications in Computer and Information Science, Vol. 199, pp. 146-151, 2011   DOI
14 Hongbin Liang, "Resource allocation for security services in mobile cloud computing", Computer Communications Workshops(INFOCOM WKSHPS), pp. 191-195, 2011
15 C. Linn and S. Debray, "Obfuscation of Executable Code to Improve Resistance to Static Disassembly," CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, pp. 290-299, Oct. 2003.
16 Guan Le, Ke Xu, Song Meina, Song, Junde, "A Survey of Research on Mobile Cloud Computing", Computer and Information Science (ICIS), pp. 387-392, 2011
17 AMIT GOYAL and SARA DADIZADEH, "A Survey on Cloud Computing", University of British Columbia Technical Report for CS 508, 2009
18 Young-Ho Kim, Jeong-Nyeo Kim, "Building Secure Execution Environment for Mobile Platform Computers", 2011 First ACIS/JNU International Conference, IEEE, pp.119-122, 2011.
19 Young-Ho Kim, Yun-Kyung Lee, and Jeong-Nye Kim. "TeeMo: A Generic Trusted Execution Framework for Mobile Devices", Computers, Networks, Systems, and Industrial Application International Conference, SERSC, Vol. 8, pp. 579-583, 2012
20 J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on Smart Phones: Attacks, Implications and Opportunities," HotMobile '10 Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications, pp. 49-54, 2010.