skip to main content
10.1145/1838002.1838008acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfitConference Proceedingsconference-collections
research-article

Realizing dynamic behavior attestation for mobile platforms

Published:16 December 2009Publication History

ABSTRACT

Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.

References

  1. IMA Sourceforge Site. http://linux-ima.sourceforge.net/.Google ScholarGoogle Scholar
  2. MPRA Specs. https://www.trustedcomputinggroup.org/specs/mobilephone/Revision\_5-tcg-mobile-reference-architecture-1\_0.pdf.Google ScholarGoogle Scholar
  3. MTM Specs. https://www.trustedcomputinggroup.org/specs/mobilephone/Revision\_6-tcg-mobile-trusted-module-1\_0.pdf.Google ScholarGoogle Scholar
  4. OMTP Advance Trusted TR1 Specifications. http://www.omtp.org/Publications/Display.aspx?Id= 48608b5d-ddeb-4c7e-bb90-a409d119f9a4.Google ScholarGoogle Scholar
  5. OMTP website. http://www.omtp.org/.Google ScholarGoogle Scholar
  6. OpenMoko Community Wiki. http://www.openmoko.org/.Google ScholarGoogle Scholar
  7. SE-LAPP, journal = Available at: http://wiki.postgresql.org/wiki/SEPostgreSQL\#LAPP.2FSELinux, year = 2009.Google ScholarGoogle Scholar
  8. SELinuxSecMod. http://www.nsa.gov/research/files/selinux/papers/policy2/x86.shtml.Google ScholarGoogle Scholar
  9. TI MShield. Available at: http://focus.ti.com/general/docs/wtbu/wtbugencontent.tsp?templateId=6123&navigationId=12316&contentId=4629.Google ScholarGoogle Scholar
  10. Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/.Google ScholarGoogle Scholar
  11. TCG Specification Architecture Overview v 1.2, page 11--12. Technical report, Trusted Computing Group, April 2004.Google ScholarGoogle Scholar
  12. SELinux Policy Management Infrastructure. Available at: http://oss.tresys.com/projects/policy-server, 2009.Google ScholarGoogle Scholar
  13. SELinux Userspace Management Tools. Available at: http://userspace.selinuxproject.org/trac/wiki/SelinuxTools, 2009.Google ScholarGoogle Scholar
  14. Trent Jaeger, Reiner Sailer, and Umesh Shankar. PRIMA: Policy-Reduced Integrity Measurement Architecture. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 19--28, New York, NY, USA, 2006. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. Proceedings of the 21st National Information Systems Security Conference, 10:303--314, 1998.Google ScholarGoogle Scholar
  16. D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger. Measuring integrity on mobile phone systems. In Proceedings of the 13th ACM symposium on Access control models and technologies, pages 155--164. ACM New York, NY, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. V. Rao and T. Jaeger. Dynamic mandatory access control for multiple stakeholders. In Proceedings of the 14th ACM symposium on Access control models and technologies, pages 53--62. ACM New York, NY, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. Proceedings of the 13th USENIX Security Symposium, pages 223--238, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Onur Aciicmez Xinwen Zhang and Jean-Pierre Seifert. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. In The First International Conference on Security and Privacy in Mobile Information and Communication Systems. MobiSec, 2009.Google ScholarGoogle Scholar
  20. X. Zhang, O. Aciiçmez, and J. P. Seifert. A trusted mobile phone reference architecturevia secure kernel. In Proceedings of the 2007 ACM workshop on Scalable trusted computing, pages 7--14. ACM New York, NY, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Realizing dynamic behavior attestation for mobile platforms

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      FIT '09: Proceedings of the 7th International Conference on Frontiers of Information Technology
      December 2009
      446 pages
      ISBN:9781605586427
      DOI:10.1145/1838002

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 December 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader