Zusammenfassung
Smartphones vermitteln uns das Gefühl rund um die Uhr vernetzt zu sein. Für viele Anwender sind Smartphones das primäre Kommunikationsgerät geworden. Große Firmen investieren mittlerweile viel Geld, um mit Smartphones neue Geschäftsfelder zu erschließen. Die neuen Anwendungen, wie z. B. Mobile Payment, haben hohe Anforderungen an die Gerätesicherheit. Vorhandene Smartphonebetriebssysteme sind diesen Anforderungen nicht gewachsen. In dieser Arbeit stellen wir L4Android vor. L4Android ist ein Betriebssystemframework, welches das Erstellen sicherer Smartphonearchitekturen ermöglicht. Wir verwenden einen modernen Mikrokern und erlauben das Ausführen von nicht sicherheitskritischer Software in einer virtuellen Maschine.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Canalys (2011) Android increases smart phone market leadership with 35 percent share. http://canalys.com/pr/2011/r2011051.html 26. Oktober 2011
Beresford AR, Rice A, Skehin N, Sohan R (2011) MockDroid: trading privacy for application functionality on smartphones. In: 12th Workshop on Mobile Computing Systems and Applications
Muthukumaran D, Sawani A, Schiffman J, Jung BM, Jaeger T (2008) Measuring integrity on mobile phone systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, ACM, New York, NY, USA, SACMAT '08, pp 155–164, DOI: http://doi.acm.org/10.1145/1377836.1377862, http://doi.acm.org/10.1145/1377836.1377862 26. Oktober 2011
Enck W, Gilbert P, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2010) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX conference on Operating systems design and implementation, USENIX Association, Berkeley, CA, USA, OSDI'10, pp 1–6, http://portal.acm.org/citation.cfm?id=1924943.1924971 26. Oktober 2011
Portokalidis G, Homburg P, Anagnostakis K, Bos H (2010) Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACM, New York, NY, USA, ACSAC '10, pp 347–356, DOI: http://doi.acm.org/10.1145/1920261.1920313, http://doi.acm.org/10.1145/1920261.1920313 26. Oktober 2011
Xie L, Zhang X, Seifert J-P, Zhu S (2010) pBMDS: a behavior-based malware detection system for cellphone devices. In: Proceedings of the third ACM conference on Wireless network security, ACM, New York, NY, USA, WiSec '10, pp 37–48, DOI: http://doi.acm.org/10.1145/1741866.1741874, http://doi.acm.org/10.1145/1741866.1741874 26. Oktober 2011
Zhou Y, Zhang X, Jiang X, Freeh VW (2011) Software Creates Privacy Mode To Help Secure Android Smartphones. http://news.ncsu.edu/releases/wms-jiang-tissa/ 26. Oktober 2011
Zhang X, Seifert JP, Acicmez O (2010) SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. In: Information and Communications Security, Springer Berlin / Heidelberg, Lecture Notes in Computer Science, vol 6476, pp 107–125, http://dx.doi.org/10.1007/978-3-642-17650-0_9 26. Oktober 2011
Coverity Inc (2010) Coverity Scan 2010 Open Source Integrity Report. http://www.coverity.com/html/press/coverity-scan-2010-report-reveals-high-risk-software-flaws-in-android.html 17. Mai 2011
Becher M, Freiling FC, Hoffmann J, T Holz SU, Wolf C (2011) Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In: Proceedings of the IEEE Symposium on Security and Privacy
Google Inc (2011) Distribution of Android Versions. http://developer.android.com/resources/dashboard/platform-versions.html 26. Oktober 2011
Barrera D, Kayacik HG, van Oorschot PC, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, New York, NY, USA, CCS '10, pp 73–84, DOI: http://doi.acm.org/10.1145/1866307.1866317, http://doi.acm.org/10.1145/1866307.1866317 26. Oktober 2011
Enck W, Octeau D, Mcdaniel P, Chaudhuri S (2011) A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium
D Maslennikov (2011) Malware in the Android Market: here we go again. http://www.securelist.com/en/blog/11267/Malware_in_the_Android_Market_here_we_go_again 26. Oktober 2011
Mahaffey K (2011) Security Alert: DroidDream Malware Found in Official Android Market. http://blog.mylookout.com/2011/03/ security-alert-malware-found-in-official-android-market-droiddream/ 12. April 2011
Droid Life: A Droid Community Blog (2011) Motorola Eases Up on Locked Bootloader Stance, Plans to Unlock Portfolio in 2011? http://www.droid-life.com/2011/04/26/motorola-eases-up-on-locked-bootloader-stance-plans-to-unlock-portfolio-in-2011/ 26. Oktober 2011
Chou P (2011) HTC to open bootloaders. https://www.facebook.com/HTC/posts/10150307320018084 26. Oktober 2011
DroidDream (2011) http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/ 26. Oktober 2011
Bishop M (2003) Computer Security: Art and Science. Addison-Wesley
Loscocco P, Smalley S (2001) Integrating Flexible Support For Security Policies Into The Linux Operating System. In: Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference
Elad B, Eli B, Nathan K (2007) Instant Ciphertext – Only Cryptanalysis of GSM Encrypted Communication. J Crypt 21(3):392–429
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Liebergeld, S., Lange, M., Lackorzynski, A., Warg, A. (2012). Hochsichere Smartphones mit L4Android. In: Verclas, S., Linnhoff-Popien, C. (eds) Smart Mobile Apps. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22259-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-22259-7_15
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22258-0
Online ISBN: 978-3-642-22259-7
eBook Packages: Computer Science and Engineering (German Language)