𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Mobile Platform Security

✍ Scribed by N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen


Publisher
Morgan & Claypool
Year
2014
Tongue
English
Leaves
110
Series
Synthesis Lectures on Information Security, Privacy, and Trust
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.Table of Contents: Preface / Introduction / Platform Security Model / Mobile Platforms / Platform Comparison / Mobile Hardware Security / Enterprise Security Extensions / Platform Security Research / Conclusions / Bibliography / Authors' Biographies

✦ Table of Contents


Preface
Introduction
Mobile Security History
Book Overview
Platform Security Model
Stakeholders
Mobile Software Architecture
Platform Security Model
Software Deployment
Application Installation
Runtime Protection
Platform Management
Mobile Platforms
Java ME
Symbian
Android
iOS
MeeGo
Windows Phone
Platform Comparison
Software Deployment
Distribution Model and Application Signing
Application Identification
Permission Request
Access Control Declaration and Scope
Access Control Granularity
Application Installation
Permission Assignment
Permission Presentation
Application Updates
Runtime Protection
Runtime Permissions
Access Control Enforcement
Execution Protection
Application Data Protection
Hardware Security APIs
Platform Management
Platform Boot Integrity
Platform Data Integrity
Platform Updates and Device Management
Device Rooting
iOS
Android
Other Mobile Operating Systems
Mobile Hardware Security
Platform Boot Integrity
Secure Boot
Authenticated Boot
Secure Storage
Isolated Execution
Device Identification
Device Authentication
Hardware Security Architectures
TEE Standards
Enterprise Security Extensions
Enterprise Security Extension Model
Infrastructure components
On-device components
Selected Commercial Solutions
Application Level Extensions
Platform Level Extensions
Mobile Device Management Software
Platform Security Research
Android-Based Platform Security Research
Attacks and Threats
Security Extensions for Android
Platform Security Research on iOS
Limits of Apple's Application Vetting Process
iOS Security Extensions
Discussion
Conclusions
Bibliography
Authors' Biographies


πŸ“œ SIMILAR VOLUMES


Security for mobile networks and platfor
✍ Selim Aissi, Nora Dabbous, Anand R. Prasad πŸ“‚ Library πŸ“… 2006 πŸ› Artech House 🌐 English

With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispens

Securing Social Identity in Mobile Platf
✍ Thirimachos Bourlai; Panagiotis Karampelas; Vishal M. Patel πŸ“‚ Library πŸ“… 2020 πŸ› Springer Nature 🌐 English

The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in

Multimodal Perception and Secure State E
✍ Rui Jiang, Xinghua Liu, Badong Chen, Shuzhi Sam Ge πŸ“‚ Library πŸ“… 2022 πŸ› Wiley-IEEE Press 🌐 English

<span>Multimodal Perception and Secure State Estimation for Robotic Mobility Platforms</span><p><span>Enables readers to understand important new trends in multimodal perception for mobile robotics </span></p><p><span>This book provides a novel perspective on secure state estimation and multimodal p

Mobile Python: Rapid prototyping of appl
✍ Scheible, JΓΌrgen;Laurila, Jukka πŸ“‚ Library πŸ“… 2007 πŸ› John Wiley & Sons 🌐 English

Mobile Python is the introduction of Python programming language to the mobile space. This practical hands-on book teaches readers how to realize their application ideas on the Symbian OS. Programming on the Symbian mobile platform has been difficult and time consuming in the past. This innovative n