Advanced SearchSearch Tips
A Study on Security Technology using Mobile Virtualization TYPE-I
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
A Study on Security Technology using Mobile Virtualization TYPE-I
Kang, Yong-Ho; Jang, Chang-Bok; Kim, Joo-Man;
  PDF(new window)
Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today`s mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.
Mobile Security;Smartwork;Mobile Virtualiza;
 Cited by
Young-Ho Kim, Jeong-Nyeo Kim, "Building Secure Execution Environment for Mobile Platform Computers", 2011 First ACIS/JNU International Conference, IEEE, pp.119-122, 2011, DOI:10.1109/CNSI.2011.36

Young-Ho Kim, Yun-Kyung Lee, and Jeong-Nye Kim. "TeeMo: A Generic Trusted Execution Framework for Mobile Devices", Computers, Networks, Systems, and Industrial Application International Conference, SERSC, Volume 8, 2012.

J. Bickford, R. O'Hare, A. Baliga, V. Ganapathy, and L. Iftode, "Rootkits on Smart Phones: Attacks, Implications and Opportunities," HotMobile'10, Feb. 2010, DOI:10.1145/1734583.1734596 crossref(new window)

Trusted Computing Group, TCG Specification Architecture Overview Specification, revision 1.4,, Aug., 2007.

C. Linn and S. Debray, "Obfuscation of Executable Code to Improve Resistance to Static Disassembly," ACM CCS, Oct. 2003, DOI:10.1145/948109.948149.

P. Barham et al., "Xen and the Art of Virtualization," ACM SOSP, Oct. 2003, DOI: 10.1145/1165389.945462

A. Whitaker, M. Shaw, and S. D. Gribble, "Scale and Performance in the Denali Isolation Kernel," ACM OSDI, vol. 36, 2002, DOI:10.1145/844128.844147 crossref(new window)

TCG, Mobile Trusted Module Specification, ver. 1.0, revision 6,, June 2008.

S. M. Lee, S. B. Suh, and B. Jeong, S. Mo, "A Multi-Layer Mandatory Access Control Mechanism for Mobile Devices Based on Virtualization", IEEE Consumer Communications and Networking Conference, Jan. 2008, DOI:10.1109/ccnc08.2007.63 crossref(new window)

J. Y. Hwang and S. B. Suh, "Xen-On-ARM: System Virtualization using Xen Hypervisor for ARM-based Secure Mobile Phones," IEEE Consumer Communications and Networking Conference, Jan. 2008, DOI:10.1109/ccnc08.2007.64 crossref(new window)

J. Azema and G, Fayad, "M-Shield Mobile Security Technology",, White Paper, Texas Instruments, 2008.

NFC mobile service standard consortium, "Dynamic management of multi-application secure elements",, White Paper, 2008.

R. Sailer, X. Zhang, T. Jeager, and L. Doorn, "Design and Implementation of a TCG-based Integrity Measurement Architecture", pers/sailer/sailer.pdf, 13th USENIX Security Symposium, Aug. 2004.

T. Garfinkel and B. Pfaff, "Terra: A Virtual Machine-Based Platform for Trusted Computing,'' ACM SOSP, 2003, DOI:10.1145/945445.945464 crossref(new window)

Jung-Oh Park and Byung-Wook Jin, "A Study on Authentication Method for Secure Payment in Fintech Environment", The Journal of The Institute of Internet, Broadcasting and Communication, Vol. 15, No. 4, pp.25-31, Aug. 2015.

Hwi-Min Choi, Chang-Bok Jang, Joo-Man Kim, Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM, DOI:10.14400/JDC.2014.12.10.299 crossref(new window)

Young-Do Joo, "Security Improvements on Smart-Card Based Mutual Authentication Scheme", International Journal of Internet, Broadcasting and Communication, The Journal of The Institute of Webcasting, Internet and Telecommunication VOL. 12 No. 6, DOI:10.7236/JIWIT.2012.12.6.91 crossref(new window)