Skip to main navigation Skip to search Skip to main content

Multi-tiered security architecture for ARM via the virtualization and security extensions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

As the ARM architecture has become the favored platform for the fastest growing computing segment, the mobile market, establishing a sound security architecture on the platform is paramount. The frightening increase in malware for the Android and iOS platforms in addition to the adoption of ARM architectures outside of the mobile market only bolster this need. In this paper, we investigate the ARM architecture as well as its security and virtualization extensions available only on the newest generation of ARM processors. Considering these extensions, we present a concept for a multi-tiered security architecture for mobile computing devices. Our concept combines a custom TrustZone component and leverages the advanced features of the Xen hypervisor to present an all encompassing framework for all aspects of security including both load and runtime verification of critical components, strong isolation between components, and virtual machine introspection for anomaly detection.

Original languageEnglish
Title of host publicationProceedings - 25th International Workshop on Database and Expert Systems Applications, DEXA 2014
EditorsFranck Morvan, Roland R. Wagner, A Min Tjoa
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages308-312
Number of pages5
ISBN (Electronic)9781479957224
DOIs
StatePublished - 3 Dec 2014
Event25th International Workshop on Database and Expert Systems Applications, DEXA 2014 - Munich, Germany
Duration: 1 Sep 20144 Sep 2014

Publication series

NameProceedings - International Workshop on Database and Expert Systems Applications, DEXA
ISSN (Print)1529-4188

Conference

Conference25th International Workshop on Database and Expert Systems Applications, DEXA 2014
Country/TerritoryGermany
CityMunich
Period1/09/144/09/14

Keywords

  • ARM
  • introspection
  • mobile
  • virtualization

Fingerprint

Dive into the research topics of 'Multi-tiered security architecture for ARM via the virtualization and security extensions'. Together they form a unique fingerprint.

Cite this