Enhancing Mobile Platform Security with Virtualization Technologies |
Kim, Jung-Han
(Department of Electrical and Computer Engineering, Sungkyunkwan University)
Kim, Jee-Hong (Department of Mobile Systems Engineering, Sungkyunkwan University) Shin, Eun-Hwan (Department of Electrical and Computer Engineering, Sungkyunkwan University) Eom, Young-Ik (Department of Electrical and Computer Engineering, Sungkyunkwan University) |
1 | 김태형, 김인혁, 김정한, 민창우, 김지홍, 엄영익, "클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술," 정보보호학회논문지, 20(5), pp. 69-79, 2010년 10월. |
2 | VirtualLogix Inc. VirtualLogix VLX for Mobile Handsets, Online at http:// www.virtuallogix.com/products/vlx-for-mobile-handsets.html |
3 | 김인혁, 김태형, 김정한, 임병홍, 엄영익, "시스템 보안을 위한 가상화 기술 활용 동향," 정보보호학회지, 19(2), pp. 26-34, 2009년 4월 |
4 | E. Ryu, I. Kim, J. Kim, and Y. Eom, "MyAV: an all-round virtual machine monitor for mobile environments," Proceedings of the IEEE International Conference on Industrial Informatics, pp. 657-662, July 2010. |
5 | R.P. Goldberg, "Survey of virtual machine research," IEEE Computer Magazine, vol. 7, no. 6, pp. 34-45, June 1974. |
6 | T. Morris and V. Nair, "PCPP: private computing on public platforms a new paradigm in public computing," Proceedings of the IEEE International Symposium on Wireless Pervasive Computing, pp. 230-235, Feb. 2007. |
7 | S. Pearson and B. Balacheff, Trusted computing platforms, Prentice Hall, 2003. |
8 | J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor and A. Perrig, "TrustVisor: efficient TCB reduction and attestation," Proceedings of the IEEE Symposium on Security and Privacy, pp. 143-158. May 2010. |
9 | 김학영, 민옥기, 남궁한, "모바일 클라우드 기술 동향," ETRI 전자통신동향분석, 제3호, 2010년 6월. |
10 | J. Hwang, S. Suh, S. Heo, C. Park, J. Rye, S. Park and C. Kim, "Xen on ARM: system virtualization using xen hypervisor for ARM-based secure mobile phones," Proceedings of the International Conference on Consumer Communications and Networking Conference, pp. 257-261, Jan. 2008. |
11 | 김기영, 강동호, "개방형 모바일 환경에서 스마트폰 보안 기술," 정보보호학회지, 19(5), pp. 21-28, 2009년 10월. |
12 | 김정한, 김인혁, 민창우, 엄영익, "모바일 가상화 기술 동향," 정보과학회지, 28(6), pp. 35-42, 2010년 6월. |
13 | M. Kim, H. Ju, Y. Kim, J. Park and Y. Park, "Design and implementation of mobile trusted module for trusted mobile computing," IEEE Transactions on Consumer Electronics, vol. 56, no. 1, pp. 134-140, Feb. 2010. DOI |
14 | 김정한, 김지홍, 엄영익, "MyAV 가상화 엔진을 이용한 안드로이드 모바일 플랫폼 가상화 기술," 2010년도 대한임베디드공학회 추계학술대회, pp. 22-23, 2010년 11월 |
15 | X. Chen, T. Garfinkel, E. Lewis, P. Subahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin and D. Ports," Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems," Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2-13, March 2008. |
16 | J. Greene, "Intel trusted execution technology," Intel Corporation, 2010. |
17 | G. Heiser and B. Leslie, "The OKL4 microvisor: convergence point of microkernels and hypervisors," Proceedings of the ACM Asia-pacific Workshop on Systems, pp. 19-23, Aug. 2010. |
18 | T. Alves and D. Felton, "Trustzone: integrated hardware and software security," ARM white paper, July 2004. |
19 | A. Joshi, S.T. King, G.W. Dunlap, and P.M. Chen. "Detecting past and present intrusions through vulnerability specific predicates," Proceedings of the 12th ACM Symposium on Operating Systems Principles, pp. 91-104, Oct. 2005. |
20 | K. Barr, P. Bungale, S. Deasy, V. Gyuris, P. Hung, C. Newell, H. Tuch and B. Zoppis, "The VMware mobile virtualization platform: is that a hypervisor in your pocket?," Proceedings of the ACM SIGOPS Operating Systems Review, pp. 124-135, Dec. 2010. |
21 | A.D. Schmidt, H.G. Schmidt, L. Batyuk, J.H. Clausen, S. A. Camtepe, and S. Albayrak, "Smartphone malware evolution revisited: android next target?," Proceedings of the IEEE International Conference on Malicious and Unwanted Software, pp. 1-7, Oct. 2009. |