Browse > Article
http://dx.doi.org/10.13089/JKIISC.2011.21.1.201

Enhancing Mobile Platform Security with Virtualization Technologies  

Kim, Jung-Han (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Kim, Jee-Hong (Department of Mobile Systems Engineering, Sungkyunkwan University)
Shin, Eun-Hwan (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Eom, Young-Ik (Department of Electrical and Computer Engineering, Sungkyunkwan University)
Abstract
Smartphone devices are widely used because of recent improvements in hardware device, network infrastructure, and emergences in open mobile platforms. These changes provide various advantages and cause security problems. One of the solutions to prevent these problems is that applying of the virtualization technology to mobile environment ha., attracted attention. In this paper, we proposed the virtualization technology which is based on security-enhanced mobile platform scheme, for secure mobile environment based on the secure execution and process concealing technology.
Keywords
Mobile Virtualization; Mobile Platform; Mobile Security; Secure Execution; Process Concealing;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 김태형, 김인혁, 김정한, 민창우, 김지홍, 엄영익, "클라우드 컴퓨팅 환경에서 보안성 향상을 위한 로컬 프로세스 실행 기술," 정보보호학회논문지, 20(5), pp. 69-79, 2010년 10월.
2 VirtualLogix Inc. VirtualLogix VLX for Mobile Handsets, Online at http:// www.virtuallogix.com/products/vlx-for-mobile-handsets.html
3 김인혁, 김태형, 김정한, 임병홍, 엄영익, "시스템 보안을 위한 가상화 기술 활용 동향," 정보보호학회지, 19(2), pp. 26-34, 2009년 4월
4 E. Ryu, I. Kim, J. Kim, and Y. Eom, "MyAV: an all-round virtual machine monitor for mobile environments," Proceedings of the IEEE International Conference on Industrial Informatics, pp. 657-662, July 2010.
5 R.P. Goldberg, "Survey of virtual machine research," IEEE Computer Magazine, vol. 7, no. 6, pp. 34-45, June 1974.
6 T. Morris and V. Nair, "PCPP: private computing on public platforms a new paradigm in public computing," Proceedings of the IEEE International Symposium on Wireless Pervasive Computing, pp. 230-235, Feb. 2007.
7 S. Pearson and B. Balacheff, Trusted computing platforms, Prentice Hall, 2003.
8 J. McCune, Y. Li, N. Qu, Z. Zhou, A. Datta, V. Gligor and A. Perrig, "TrustVisor: efficient TCB reduction and attestation," Proceedings of the IEEE Symposium on Security and Privacy, pp. 143-158. May 2010.
9 김학영, 민옥기, 남궁한, "모바일 클라우드 기술 동향," ETRI 전자통신동향분석, 제3호, 2010년 6월.
10 J. Hwang, S. Suh, S. Heo, C. Park, J. Rye, S. Park and C. Kim, "Xen on ARM: system virtualization using xen hypervisor for ARM-based secure mobile phones," Proceedings of the International Conference on Consumer Communications and Networking Conference, pp. 257-261, Jan. 2008.
11 김기영, 강동호, "개방형 모바일 환경에서 스마트폰 보안 기술," 정보보호학회지, 19(5), pp. 21-28, 2009년 10월.
12 김정한, 김인혁, 민창우, 엄영익, "모바일 가상화 기술 동향," 정보과학회지, 28(6), pp. 35-42, 2010년 6월.
13 M. Kim, H. Ju, Y. Kim, J. Park and Y. Park, "Design and implementation of mobile trusted module for trusted mobile computing," IEEE Transactions on Consumer Electronics, vol. 56, no. 1, pp. 134-140, Feb. 2010.   DOI
14 김정한, 김지홍, 엄영익, "MyAV 가상화 엔진을 이용한 안드로이드 모바일 플랫폼 가상화 기술," 2010년도 대한임베디드공학회 추계학술대회, pp. 22-23, 2010년 11월
15 X. Chen, T. Garfinkel, E. Lewis, P. Subahmanyam, C. Waldspurger, D. Boneh, J. Dwoskin and D. Ports," Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems," Proceedings of the International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 2-13, March 2008.
16 J. Greene, "Intel trusted execution technology," Intel Corporation, 2010.
17 G. Heiser and B. Leslie, "The OKL4 microvisor: convergence point of microkernels and hypervisors," Proceedings of the ACM Asia-pacific Workshop on Systems, pp. 19-23, Aug. 2010.
18 T. Alves and D. Felton, "Trustzone: integrated hardware and software security," ARM white paper, July 2004.
19 A. Joshi, S.T. King, G.W. Dunlap, and P.M. Chen. "Detecting past and present intrusions through vulnerability specific predicates," Proceedings of the 12th ACM Symposium on Operating Systems Principles, pp. 91-104, Oct. 2005.
20 K. Barr, P. Bungale, S. Deasy, V. Gyuris, P. Hung, C. Newell, H. Tuch and B. Zoppis, "The VMware mobile virtualization platform: is that a hypervisor in your pocket?," Proceedings of the ACM SIGOPS Operating Systems Review, pp. 124-135, Dec. 2010.
21 A.D. Schmidt, H.G. Schmidt, L. Batyuk, J.H. Clausen, S. A. Camtepe, and S. Albayrak, "Smartphone malware evolution revisited: android next target?," Proceedings of the IEEE International Conference on Malicious and Unwanted Software, pp. 1-7, Oct. 2009.