Measuring integrity on mobile phone systems

作者: Divya Muthukumaran , Anuj Sawani , Joshua Schiffman , Brian M. Jung , Trent Jaeger

DOI: 10.1145/1377836.1377862

关键词:

摘要: Mobile phone security is a relatively new field that gathering momentum in the wake of rapid advancements system technology. phones are now becoming sophisticated smart provide services beyond basic telephony, such as supporting third-party applications. Such applications may be security-critical, mobile banking, or untrusted applications, downloaded games. Our goal to protect integrity critical from potentially functionality, but we find existing mandatory access control approaches too complex and do not formal guarantees. In this work, leverage simplicity inherent environments develop compact SELinux policy can used justify using Policy Reduced Integrity Measurement Architecture (PRIMA) approach. We show resultant enables systems proven secure remote parties, desired functionality for installing running trusted programs, over 90% smaller size. envision approach an outline how build high systems.

参考文章(10)
Reiner Sailer, Trent Jaeger, Umesh Shankar, Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. network and distributed system security symposium. ,(2006)
Norm Hardy, The Confused Deputy: (or why capabilities might have been invented) Operating Systems Review. ,vol. 22, pp. 36- 38 ,(1988) , 10.1145/54289.871709
E. Shi, A. Perrig, L. Van Doorn, BIND: a fine-grained attestation service for secure distributed systems ieee symposium on security and privacy. pp. 154- 168 ,(2005) , 10.1109/SP.2005.4
Xinwen Zhang, Onur Acıiçmez, Jean-Pierre Seifert, A trusted mobile phone reference architecturevia secure kernel Proceedings of the 2007 ACM workshop on Scalable trusted computing - STC '07. pp. 7- 14 ,(2007) , 10.1145/1314354.1314359
Trent Jaeger, Reiner Sailer, Umesh Shankar, PRIMA Proceedings of the eleventh ACM symposium on Access control models and technologies - SACMAT '06. pp. 19- 28 ,(2006) , 10.1145/1133058.1133063
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick McDaniel, Establishing and Sustaining System Integrity via Root of Trust Installation annual computer security applications conference. pp. 19- 29 ,(2007) , 10.1109/ACSAC.2007.25
James Morris, Crispin Cowan, Stephen Smalley, Chris Wright, Greg Kroah-Hartman, Linux Security Modules: General Security Support for the Linux Kernel usenix security symposium. pp. 17- 31 ,(2002)
T. Fraser, LOMAC: Low Water-Mark integrity protection for COTS environments ieee symposium on security and privacy. pp. 230- 245 ,(2000) , 10.1109/SECPRI.2000.848460
Rich MacDonald, Omen Wild, John Marchesini, Sean Smith, Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear ,(2003)