Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures

  • Authors:
  • Kari Kostiainen;Elena Reshetova;Jan-Erik Ekberg;N. Asokan

  • Affiliations:
  • Nokia Research Center, Helsinki, Finland;Nokia, Helsinki, Finland;Nokia Research Center, Helsinki, Finland;Nokia Research Center, Helsinki, Finland

  • Venue:
  • Proceedings of the first ACM conference on Data and application security and privacy
  • Year:
  • 2011

Quantified Score

Hi-index 0.01

Visualization

Abstract

The recent dramatic increase in the popularity of "smartphones" has led to increased interest in smartphone security research. From the perspective of a security researcher the noteworthy attributes of a modern smartphone are the ability to install new applications, possibility to access Internet and presence of private or sensitive information such as messages or location. These attributes are also present in a large class of more traditional "feature phones." Mobile platform security architectures in these types of devices have seen a much larger scale of deployment compared to platform security architectures designed for PC platforms. In this paper we start by describing the business, regulatory and end-user requirements which paved the way for this widespread deployment of mobile platform security architectures. We briefly describe typical hardware-based security mechanism that provide the foundation for mobile platform security. We then describe and compare the currently most prominent open mobile platform security architectures and conclude that many features introduced recently are borrowed, or adapted with a twist, from older platform security architectures. Finally, we identify a number of open problems in designing effective mobile platform security.