A flexible security architecture to support third-party applications on mobile devices

作者: Lieven Desmet , Wouter Joosen , Fabio Massacci , Katsiaryna Naliuka , Pieter Philippaerts

DOI: 10.1145/1314466.1314470

关键词:

摘要: The problem of supporting the secure execution potentially malicious third-party applications has received a considerable amount attention in past decade. In this paper we describe security architecture for mobile devices that supports flexible integration variety advanced technologies such applications, including run-time monitoring, static verification and proof-carrying code. also legacy have not been developed to take advantage our architecture, though it can provide better performance additional services are architecture-aware.The proposed implemented on Windows Mobile device with .NET Compact Framework. It offers substantial benefit compared standard (state-of-practice) devices, even applications.

参考文章(13)
Katsiaryna Naliuka, Fabio Massacci, Multi-session Security Monitoring for Mobile Code ,(2006)
George C. Necula, Proof-carrying code symposium on principles of programming languages. pp. 106- 119 ,(1997) , 10.1145/263699.263712
Fred B. Schneider, Enforceable security policies ACM Transactions on Information and System Security. ,vol. 3, pp. 30- 50 ,(2000) , 10.1145/353323.353382
George C. Necula, Peter Lee, The design and implementation of a certifying compiler programming language design and implementation. ,vol. 33, pp. 333- 344 ,(1998) , 10.1145/277650.277752
Irem Aktug, Katsiaryna Naliuka, ConSpec – A formal language for policy specification Science of Computer Programming. ,vol. 74, pp. 2- 12 ,(2008) , 10.1016/J.SCICO.2008.09.004
Úlfar Erlingsson, Fred B. Schneider, The inlined reference monitor approach to security policy enforcement Cornell University. ,(2004)
D. Evans, A. Twyman, Flexible policy-directed code safety ieee symposium on security and privacy. pp. 32- 45 ,(1999) , 10.1109/SECPRI.1999.766716
Lujo Bauer, Jay Ligatti, David Walker, Composing security policies with polymer programming language design and implementation. ,vol. 40, pp. 305- 314 ,(2005) , 10.1145/1064978.1065047
U. Erlingsson, F.B. Schneider, IRM enforcement of Java stack inspection ieee symposium on security and privacy. pp. 246- 255 ,(2000) , 10.1109/SECPRI.2000.848461
Rick Kazman, Mark Klein, Paul Clements, ATAM: Method for Architecture Evaluation Defense Technical Information Center. ,(2000) , 10.21236/ADA382629