Trustworthy Execution on Mobile Devices
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitiv...
| Main Authors: | , , |
|---|---|
| Corporate Author: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
New York, NY :
Springer New York : Imprint: Springer,
2014.
|
| Series: | SpringerBriefs in Computer Science,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Introduction
- Demand for Applications Requiring Hardware Security
- Desired Security Features
- Available Hardware Primitives
- Isolated Execution Environments
- API Architectures
- Analysis and Recommendations
- Summary.