Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Are there good Reasons for Protecting Mobile Phones with Hypervisors?
RISE, Swedish ICT, SICS, Security Lab.ORCID iD: 0000-0001-8003-200x
RISE, Swedish ICT, SICS.
2011 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Security threats on consumer devices such as mobile phones are increasing as the software platforms become more open and complex. Therefore, hypervisors, which bring potential new secure services to embedded systems, are becoming increasingly important. In this paper, we look into how to design a hypervisor-based security architecture for an advanced mobile phone. Key security components of the architecture have been verified through a hypervisor implemented on an emulated ARM platform. We compare the hypervisor security architecture with TrustZone and summarize the major benefits and limitations of the hypervisor approach. In short, hypervisors exhibit several advantages such as support of multiple secure execution domains and monitoring of non-trusted domains; however, this comes at the cost of larger legacy system porting efforts.

Place, publisher, year, edition, pages
2011, 9. p. 493-498
Keywords [en]
Security, Virtualization, Embedded Systems, ARM, Hypervisor, TrustZone, Mobile Communications
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:ri:diva-23955OAI: oai:DiVA.org:ri-23955DiVA, id: diva2:1043033
Conference
IEEE Consumer Communications and Networking Conference
Projects
SVAMPAvailable from: 2016-10-31 Created: 2016-10-31 Last updated: 2020-12-01Bibliographically approved

Open Access in DiVA

fulltext(248 kB)218 downloads
File information
File name FULLTEXT01.pdfFile size 248 kBChecksum SHA-512
4b51d9608c871ba5f6dbd57997fa4525a19da8be0095e0af1b87a7f6f681f07a0be3ccaaabeb0696953c912289608f7012281fec54141f469f5f5fcdd5c7ff93
Type fulltextMimetype application/pdf

Other links

http

Authority records

Gehrmann, Christian

Search in DiVA

By author/editor
Gehrmann, Christian
By organisation
Security LabSICS
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 218 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 284 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf