skip to main content
10.1145/1435458.1435462acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Virtualization as an enabler for security in mobile devices

Published: 01 April 2008 Publication History

Abstract

Virtualization, a well established technology in the desktop and server domain, is currently investigated and analyzed with respect to its potential within mobile devices. The paper argues that mobile devices, which are targeting a completely open setup (e.g. Linux based), are facing severe security challenges. Thus, virtualization will be discussed as an enabler for security in mobile devices. Virtualization approaches and elements are discussed in detail taking this use case and existing limitations of mobile embedded devices into account.

References

[1]
Nokia Press Release, October 18, 2007; http://www.nokia.com/results/results2007Q3e.pdf
[2]
J. Brakensiek, T. Eriksson, R. Suoranta, P. Liuha, "Modular Service based Platform Architecture for Mobile Devices"; WWRF Shanghai 2006.
[3]
Virtualization Overview, White paper, VMware 2006
[4]
J. E. Smith, R. Nair: "The Architecture of Virtual Machines"; IEEE Computer Magazine, Volume 38, Issue 5, May 2005.
[5]
J. E. Smith, R. Uhlig: "Virtual Machines: Architectures, Implementations and Applications"; HotChips 17 Tutorial, 2005
[6]
H. Härtig, M. Hohmuth, J. Liedtke, S. Schönberg, J. Wolter: "The Performance of μ-Kernel-Based Systems"; 16th ACM Symposium on Operating Systems Principles (SOSP '97), October 5--8, 1997, Saint-Malo, France
[7]
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, A. Warrfeld, "Xen and the Art of Virtualization", SOSP'03, 2003, Bolton Landing, NY
[8]
L. P. Cox, P. M. Chen, "Pocket Hypervisors: Opportunities and Challenges", 8th IEEE Workshop on Mobile Computing Systems and Applications, 2007
[9]
H. Härtig, M. Hohmuth, N. Feske, C. Helmuth, A. Lackorzynski, F. Mehnert, M. Peter: "The Nizza Secure-System Architecture", 1st International Conference on Collaborative Computing: Networking, Applications and Worksharing, San Jose, CA, December 2005
[10]
The Fiasco Microkernel, http://os.inf.tu-dresden.de/fiasco/
[11]
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, D. Boneh: "Terra: A Virtual Machine-Based Platform for Trusted Computing", SOSP'03, 2003, Bolton Landing, NY, USA.
[12]
L. Singaravelu, C. Pu, H. Härtig, C. Helmuth: "Reducing TCB Complexity for Security-Sensitive Applications: Three Case Studies", Eurosys'06, April 18--21, 2006, Leuven, Belgium.
[13]
G. Neiger, A. Santoni, F. Leung, D. Rodgers, R. Uhlig: "Intel® Virtualization Technology: Hardware Support for Efficient Processor Virtualization", Intel White Paper, http://www.intel.com/technology/itj/2006/v10i3/1-hardware/1-abstract.htm
[14]
"Industry Leading Virtualization Platform Efficiency", AMD, http://www.amd.com/usen/Processors/ProductInformation/0,30_118_8796_14287,00.html
[15]
http://en.wikipedia.org/wiki/Virtual_appliance
[16]
J. Pagonis, "Symbian OS C++ -a first look under the hood", http://developer.symbian.com/wiki/download/attachments/13 76/John_Pagonis.pdf
[17]
Nicta web-page, "L4 Performance", http://ertos.nicta.com.au/research/l4/performance.pml
[18]
http://www.ddj.com/embedded/201000360
[19]
http://www.mobilewhack.com/grundig-mobiles-u900-linux-phone/

Cited By

View all
  • (2021)Observing a Moving Target - Reliable Transmission of Debug Logs from Mobile Embedded Devices2021 IEEE International Conference on Cloud Engineering (IC2E)10.1109/IC2E52221.2021.00038(224-230)Online publication date: Oct-2021
  • (2019)NezhaProceedings of the 20th International Workshop on Mobile Computing Systems and Applications10.1145/3301293.3302361(39-44)Online publication date: 22-Feb-2019
  • (2019)HyperCo: Optimizing Network Performance in ARM-Based Mobile VirtualizationIEEE Transactions on Services Computing10.1109/TSC.2016.259476012:1(131-143)Online publication date: 1-Jan-2019
  • Show More Cited By

Index Terms

  1. Virtualization as an enabler for security in mobile devices

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    IIES '08: Proceedings of the 1st workshop on Isolation and integration in embedded systems
    April 2008
    50 pages
    ISBN:9781605581262
    DOI:10.1145/1435458
    • Editors:
    • Michael Engel,
    • Olaf Spinczyk
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 April 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. hypervisor
    2. mobile device
    3. virtual machine monitor
    4. virtualization

    Qualifiers

    • Research-article

    Conference

    Eurosys '08
    Sponsor:
    Eurosys '08: Eurosys 2008 Conference
    April 1, 2008
    Glasgow, Scotland

    Upcoming Conference

    EuroSys '25
    Twentieth European Conference on Computer Systems
    March 30 - April 3, 2025
    Rotterdam , Netherlands

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)5
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Observing a Moving Target - Reliable Transmission of Debug Logs from Mobile Embedded Devices2021 IEEE International Conference on Cloud Engineering (IC2E)10.1109/IC2E52221.2021.00038(224-230)Online publication date: Oct-2021
    • (2019)NezhaProceedings of the 20th International Workshop on Mobile Computing Systems and Applications10.1145/3301293.3302361(39-44)Online publication date: 22-Feb-2019
    • (2019)HyperCo: Optimizing Network Performance in ARM-Based Mobile VirtualizationIEEE Transactions on Services Computing10.1109/TSC.2016.259476012:1(131-143)Online publication date: 1-Jan-2019
    • (2019)Virtualization, Containerization, Composition, and Orchestration of Cloud Computing ServicesComputational Science and Its Applications – ICCSA 201910.1007/978-3-030-24305-0_30(403-417)Online publication date: 29-Jun-2019
    • (2018)Build a trusted storage system on a mobile phoneIET Information Security10.1049/iet-ifs.2018.5031Online publication date: 10-Aug-2018
    • (2016)A Survey of Mobile Device VirtualizationACM Computing Surveys10.1145/289716449:1(1-36)Online publication date: 5-Apr-2016
    • (2015)A Lightweight Virtualization Solution for Android DevicesIEEE Transactions on Computers10.1109/TC.2015.238979164:10(2741-2751)Online publication date: 1-Oct-2015
    • (2015)A model for secure mobile computing2015 Science and Information Conference (SAI)10.1109/SAI.2015.7237299(1213-1221)Online publication date: Jul-2015
    • (2015)Systematic overview of mobile virtualization platforms: Comparative analysis2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT)10.1109/ICECCT.2015.7226063(1-4)Online publication date: Mar-2015
    • (2015)Only play in your comfort zone: interaction methods for improving security awareness on mobile devicesPersonal and Ubiquitous Computing10.1007/s00779-015-0840-519:5-6(941-954)Online publication date: 27-Mar-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media