Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.1.49

Mobile Devices Control System using LSM  

Bae, Hee-sung (Education Division of Korea Air Force)
Kim, So-yeon (Hanseo University)
Park, Tae-kyou (Hanseo University)
Abstract
With the prevalence of mobile devices, many organizations introduce MDM BYOD and try to increase the level of security with them. However, device control of mobile devices in application level cannot be a solution against the fundamental problems. In this paper, we propose a more flexible and more secure method to control the hardware devices using Linux Security Module in the kernel level with the mandatory access control.
Keywords
MDM Security; Linux Security Module; Kernel Level; Mandatory Access Control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sun-Kuk Noh and Jae-Sub Kim, "A Study on the Improvement of Propagation Shadow Region for Mobile Communications," Journal of the Korean Institute of Comm. and Information Sciences, Vol.23, No.11T, November 1998.
2 Kang-Hyun Lee and Do-Sik Yoon, "Efficient Approach of MDM for Mobile Security," Review of the Korea Institute of Information Security and Cryptology, Vol.23, N.2, April 2013.
3 White Paper : An Overview of Samsung KNOX, April 2013.
4 Stephen Smalley and Robert Craig, "Android: Bringing Flexible MAC to Android," In Network & Distributed System Security Symposium (NDSS'13), 2013.
5 Chris Wrigth et al., Linux Security Modules: General Security Support for the Linux kernel, August 2002.
6 Chris Runge, "SELinux:A New Approach to Secure System," Red Hat global resource library, September 2008.
7 Toshiharu Harada et al., "Task Oriented Management Obviates Your Onus on Linux," Linux Conference 2004.
8 National Security Agency, Security-Enhanced Linux. http://www.nsa.gov/research/selinux
9 AnTuTu benchmark http://www.AnTuTulabs.com/AnTuTu-Benchmark
10 LMBench-Tools for Performance Analysis http://www.bitmover.com/lmbench