The performance of μ-kernel-based systems
Proceedings of the sixteenth ACM symposium on Operating systems principles
Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
The Architecture of Virtual Machines
Computer
Reducing TCB complexity for security-sensitive applications: three case studies
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Pocket Hypervisors: Opportunities and Challenges
HOTMOBILE '07 Proceedings of the Eighth IEEE Workshop on Mobile Computing Systems and Applications
Taming subsystems: capabilities as universal resource access control in L4
Proceedings of the Second Workshop on Isolation and Integration in Embedded Systems
MobiVMM: a virtual machine monitor for mobile phones
Proceedings of the First Workshop on Virtualization in Mobile Computing
A step to support real-time in virtual machine
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Device driver isolation within virtualized embedded platforms
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Compilation and virtualization in the HiPEAC vision
Proceedings of the 47th Design Automation Conference
ICHIT'11 Proceedings of the 5th international conference on Convergence and hybrid information technology
Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Hi-index | 0.00 |
Virtualization, a well established technology in the desktop and server domain, is currently investigated and analyzed with respect to its potential within mobile devices. The paper argues that mobile devices, which are targeting a completely open setup (e.g. Linux based), are facing severe security challenges. Thus, virtualization will be discussed as an enabler for security in mobile devices. Virtualization approaches and elements are discussed in detail taking this use case and existing limitations of mobile embedded devices into account.