Implementing a Multi-hat PDA

  • Matthew Johnson
  • Frank Stajano
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4631)


We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth cellphone, as an alternative authentication method. We analyse in detail the suitability of several alternatives for the graphical environment and underlying OS and we discuss a variety of interesting implementation issues that arose during development.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Alkassar, A., Stüble, C., Sadeghi, A.-R.: Secure object identification—or: solving the Chess Grandmaster Problem. In: NSPW 2003. Proceedings of the 2003 workshop on New security paradigms, pp. 77–85. ACM Press, New York (2003)CrossRefGoogle Scholar
  2. 2.
    Anonymous. Windows XP Technical Overview White Paper (May 2001),
  3. 3.
    Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: SOSP 2003. Proceedings of the nineteenth ACM symposium on Operating systems principles, pp. 164–177. ACM Press, New York (2003), CrossRefGoogle Scholar
  4. 4.
    Beth, T., Desmedt, Y.: Identification Tokens—or: Solving the Chess Grandmaster Problem. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 11–15. Springer, Heidelberg (1991)Google Scholar
  5. 5.
    Brands, S., Chaum, D.: Distance Bounding Protocols. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 302–9743. Springer, Heidelberg (1994), Google Scholar
  6. 6.
    Corner, M.D., Noble, B.D.: Zero-Interaction Authentication. In: The Eighth ACM Conference on Mobile Computing and Networking, ACM Press, New York (2002), Google Scholar
  7. 7.
    Kilpatrick, D., Salamon, W., Vance, C.: Securing The X Window System With SELinux. Tech. Rep. 03-006, NAI Labs (March 2003),
  8. 8.
    Loscocco, P., Smalley, S.: Integrating Flexible Support for Security Policies into the Linux Operating System. In: The 2001 USENIX Annual Technical Conference, USENIX Association (2001)Google Scholar
  9. 9.
    Richardson, T., Bennett, F., Hopper, A.: Teleporting in an X Window System Environment. IEEE Personal Communications Magazine 1(3), 6–12 (1994), CrossRefGoogle Scholar
  10. 10.
    Richardson, T., Stafford-Fraser, Q., Wood, K.R., Hopper, A.: Virtual Network Computing. IEEE Internet Computing 2(1), 33–38 (1998), CrossRefGoogle Scholar
  11. 11.
    Sastry, N., Shankar, U., Wagner, D.: Secure Verification of Location Claims. CryptoBytes 7(1), 17–29 (2004)Google Scholar
  12. 12.
    Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002), Google Scholar
  13. 13.
    Stajano, F.: One user, many hats; and, sometimes, no hat—towards a secure yet usable PDA. In: The Twelfth International Workshop on Security Protocols (to appear),

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Matthew Johnson
    • 1
  • Frank Stajano
    • 1
  1. 1.University of Cambridge 

Personalised recommendations