[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1314354.1314359acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A trusted mobile phone reference architecturevia secure kernel

Published: 02 November 2007 Publication History

Abstract

Driven by the ever increasing information security demands in mobile devices, the Trusted Computing Group (TCG) formed a dedicated group - Mobile Phone Working Group (MPWG). to address the security needs of mobile platforms. Along this direction, the MPWG has recently released a Trusted Mobile Phone Reference Architecture Specification. In order to realize trusted mobile platforms, they adapt well-known concepts like TPM, isolation, integrity measurement, etc. from the trusted PC world - with slight modifications due to the characteristics and resource limitations of mobile devices - into generic mobile phone platforms. The business needs of mobile phone industry mandate 4 different stakeholders(platform owners): device manufacturer, cellular service provider, general service provider, and of course the end-user. The specification requires separate trusted and isolated operational domains, so called Trusted Engines, for each of these stakeholders. Although the TCG MPWG does not explicitly prescribe a specific technical realization of these Trusted Engines, a general perception suggests reusing the very well established (Trusted) Virtualization concept from corresponding PC architectures. However, despite of all its merits, the current "resource devourer" Virtualization is not very well suited for mobile devices. Thus, in this paper, we propose another isolation technique, which is specifically crafted for mobile phone platforms and respects its resource limitations. We achieve this goal by realizing the TCG's Trusted Mobile Phone specification by leveraging SELinux which provides a generic domain isolation concept at the kernel level. Additional to harnessing the potential of SELinux to realize mobile phone specific (isolated) operational domains, we are also able to seamlessly integrate the important integrity measurement and verification concept into our SELinux-based Trusted Mobile Phone architecture. This is achieved by defining some SELinux policy language extensions. Thus, the present paper provides a novel, efficient and inherently secure TCG-aware Mobile Phone reference architecture

References

[1]
M. Alam, M. Hafner, J.-P. Seifert, and X. Zhang. Extending SELinux Policy Model and Enforcement Architecture for Trusted Platforms Paradigms. In Annual SELinux Symposium 2007.
[2]
Apparmor. http://en.opensuse.org/AppArmor.
[3]
J. Brizek, M. Khan, J.-P. Seifert, and D. A. Wheeler. A Platform-level Trust-Architecture for Hand-held Devices. In CRASH (2005).
[4]
CDS Framework IDE. http://oss.tresys.com/projects/cdsframework.
[5]
T. Eisenbarth, T. Güneysu, C. Paar, A. R. Sadeghi, D. Schellekens, and M. Wolf. Reconfigurable Trusted Computing in Hardware. In ACM STC '07.
[6]
HP NetTop: A technical overview. http://h20338.www2.hp.com/enterprise/downloads/ HP_NetTop_Whitepaper2.pdf.
[7]
Limo foundation. https://www.limofoundation.org.
[8]
NSA Security-Enhanced Linux Example Policy. http://www.nsa.gov/selinux/.
[9]
Open Mobile Alliance. http://www.openmobilealliance.org.
[10]
Open trusted computing (opentc) consortium. http://www.opentc.net/.
[11]
SELinux Reference Policy. http://oss.tresys.com/projects/refpolicy.
[12]
The Linux Intrusion Defence System (LIDS). http://www.lids.org/.
[13]
Linux phone market opening up? http://www.linuxdevices.com/news/NS8591201260.html, 2007.
[14]
TCG mobile reference architecture specification version 1.0. https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobilereference-architecture-1.0.pdf, June 2007
[15]
TCG Mobile Trusted Module Specification Version 1.0. https://www.trustedcomputinggroup.org/specs/mobilephone/tcg-mobiletrusted-module-1.0.pdf, June 2007.
[16]
K. Adams and O. Agesen. A comparison of software and hardware techniques for x86 virtualization. In Proceedings of the Twelfth International Conference on Architectural Support for Programming Languages and Operating Systems, pages 2--13, San Jose, CA, USA, October 21-25 2006.
[17]
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Mitre Corp. Report No.M74--244, Bedford, Mass., 1975.
[18]
K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, The Mitre Corporation, Bedford, MA, April 1977.
[19]
W. Boebert and R. Kain. A practical alternative to hierarchical integrity policies. In Proc. of the 8th National Computer Security Conference, 1985.
[20]
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In Proceedings of IEEE Symposium on Security and Privacy, pages 184--194, Oakland, CA, May 1987.
[21]
Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria, December 1985. DoD 5200.28-STD.
[22]
T. Fraser. LOMAC: MAC you can live with. In Proc. of the 2001 Usenix Annual Technical Conference, Jun 2001.
[23]
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In Proceedings of the 19th ACM Symposium on Operating Systems Principles, pages 193--206, Bolton Landing, New York, USA, October 19-22 2003.
[24]
T. Jaeger, R. Sailer, and U. Shankar. PRIMA: Policy-reduced integrity measurement architecture. In Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, pages 19--28, June 2006.
[25]
N. L. Kelem and R. J. Feiertag. A separation model for virtual machine monitors. In IEEE Symposium on Research in Security and Privacy, 1991.
[26]
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the linux operating system. In Proceedings of USENIX Annual Technical Conference, pages 29--42, June 25-30 2001.
[27]
K. MacMillan, S. Shimko, C. Sellers, F. Mayer, and A. Wilson. Lessons learned developing cross-domain solutions on selinux. In Proc. of SELinux Symposium, 2006.
[28]
F. Mayer, K. MacMillan, and D. Caplan. SELinux by Example: Using Security Enhanced Linux. Prentice Hall, 2007.
[29]
OMTP. Application security framework. http://www.omtp.org/docs/OMTP_Application_Security_Framework_v2_0.pdf, 2007.
[30]
C. J. PeBenito, F. Mayer, and K. MacMillan. Reference policy for security enhanced linux. In Proc. of SELinux Symposium, 2006.
[31]
R. Sailer, T. Jaeger, E. Valdez, R. Perez, S. Berger, J. L. Griffin, and L. van Doorn. Building a mac-based security architecture for the xen opensource hypervisor. Technical report, IBM Research Report RC23629, 2005.
[32]
J. M. Rushby. Proof of separability: A verification technique for a class of security kernels. In Computing Laboratory, University of Newcastle Upon Tyne, May 5 1981.
[33]
A. Sadeghi and C. Stuble. Taming trusted platforms by operating system design. In Proceedings of the 4th International Workshop for Information Security Applications, LNCS 2908, pages 286--302, Berlin, Germany, August 2003.
[34]
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, pages 223--238, 2004.
[35]
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, 1975.
[36]
A. Wilson. SEFramework: A new policy development framework and tool to support security engineering. In Proc. of SELinux Symposium, 2005.

Cited By

View all
  • (2018)Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform2018 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2018.00021(183-198)Online publication date: Apr-2018
  • (2018)Build a trusted storage system on a mobile phoneIET Information Security10.1049/iet-ifs.2018.5031Online publication date: 10-Aug-2018
  • (2016)Secure and Flexible Trace-Based Debugging of Systems-on-ChipACM Transactions on Design Automation of Electronic Systems10.1145/299460122:2(1-25)Online publication date: 28-Dec-2016
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STC '07: Proceedings of the 2007 ACM workshop on Scalable trusted computing
November 2007
82 pages
ISBN:9781595938886
DOI:10.1145/1314354
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. SELinux
  2. isolation
  3. secure kernel
  4. security architecture
  5. trusted mobile computing

Qualifiers

  • Article

Conference

CCS07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 17 of 31 submissions, 55%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform2018 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2018.00021(183-198)Online publication date: Apr-2018
  • (2018)Build a trusted storage system on a mobile phoneIET Information Security10.1049/iet-ifs.2018.5031Online publication date: 10-Aug-2018
  • (2016)Secure and Flexible Trace-Based Debugging of Systems-on-ChipACM Transactions on Design Automation of Electronic Systems10.1145/299460122:2(1-25)Online publication date: 28-Dec-2016
  • (2015)Reliable Voice-Based Transactions over VoIP Communications2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing10.1109/IMIS.2015.20(101-108)Online publication date: Jul-2015
  • (2015)Improving mobile device security with operating system-level virtualizationComputers and Security10.1016/j.cose.2015.02.00552:C(207-220)Online publication date: 1-Jul-2015
  • (2014)DroidVaultProceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems10.1109/ICECCS.2014.13(29-38)Online publication date: 4-Aug-2014
  • (2013)Trust relationships in secure mobile systems2013 IEEE Wireless Communications and Networking Conference (WCNC)10.1109/WCNC.2013.6554851(1882-1887)Online publication date: Apr-2013
  • (2013)A Survey on Security for Mobile DevicesIEEE Communications Surveys & Tutorials10.1109/SURV.2012.013012.0002815:1(446-471)Online publication date: Sep-2014
  • (2013)Improving Mobile Device Security with Operating System-Level VirtualizationSecurity and Privacy Protection in Information Processing Systems10.1007/978-3-642-39218-4_12(148-161)Online publication date: 2013
  • (2013)Security in Emerging 4G NetworksNext-Generation Wireless Technologies10.1007/978-1-4471-5164-7_12(243-272)Online publication date: 2013
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media