By Topic

A Smartphone Security Architecture for App Verification and Process Authentication

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Ugus, O. ; HAW Hamburg, Hamburg, Germany ; Landsmann, M. ; Gessner, D. ; Westhoff, D.

We present a runtime integrity measurement for Linux-based smartphones. It is based on a Mobile Trusted Module (MTM) with the objective to prevent running arbitrary third-party applications (Apps) on a smartphone. Only Apps signed by the MTM are allowed to run on the smartphone. Moreover, the proposed architecture inhibits running Apps which are infected with e.g. a mobile virus after their installation. We believe that the proposed approach is useful particularly for company administrators who want to fully control the list of Apps allowed to run on employees' smartphones and to ensure that Apps altered after their installation or installed without company permission are never executed.

Published in:

Computer Communications and Networks (ICCCN), 2012 21st International Conference on

Date of Conference:

July 30 2012-Aug. 2 2012