Abstract
A variety of new security technology has emerged in the mobile security area recently, especially domain isolation technique is widely used, such as TrustZone, Samsung KNOX, etc. By storing user sensitive information and business data in a secure domain, which is isolated from normal domain, may not be exposed to unexpected security accident or unauthorized access. When the security incidents occurred on these devices, it might be impossible to collect data from secure domain, because common forensic tools cannot be accessed in isolated domain. Therefore, it is necessary to research data collection techniques on the device based on domain separation technology. This paper discusses data collection techniques in the secure domain applied by mobile hypervisor-based separation technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Frenzel T, Lackorzynski A, Warg A, Härtig H (2010) ARM TrustZone as a virtualization technique in embedded systems. In: 12th real-time linux workshop
Samsung KNOX from Wikipedia. https://en.wikipedia.org/wiki/Samsung_Knox
Kim Y, Lee Y, Kim J (2012) TeeMo: a generic trusted execution framework for mobile devices. In: International conference on computer, networks, systems, and industrial applications (CNSI), pp 579–583
Andrus J, Dall C, Van’t Hof A, Laadan O, Nieh J (2011) Cells: a virtual mobile smartphone architecture. In: Proceedings of the 23th ACM symposium on operating systems principles
Kim K, Kim C, Jung S, Shin H, Kim J (2008) Inter-domain socket communications supporting high performance and full binary compatibility on Xen. In: Proceedings of the fourth ACM SIGPLAN/SIGOPS, pp 11–20
Colp P, Nanavati M, Zhu J, Aiello W, Coker G, Deegan T, Loscocco P, Warfield A (2011) Breaking up is hard to do: security and functionality in a commodity hypervisor. In: Proceedings of 23rd ACM symposium on operating systems principles
Lim K, Jeon Y, Kim J, Lee D (2015) A methodology for live forensic acquisition in secure domain based on domain separation technology. Adv Comput Commun Eng Technol 362:1113–1123
Lim K, Park S, Kim J, Lee D (2015) Functional considerations in military-grade security platform using a mobile hypervisor. Comput Sci Appl Lect Notes Electr Eng 330:1413–1418
Acknowledgments
Foundation item: This work was supported by the ICT R&D program of MSIP/IITP, Korea. [R0101-15-0195(10043959), Development of EAL 4 level military fusion security solution for protecting against unauthorized accesses and ensuring a trusted execution environment in mobile devices]
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Lim, KS., Kim, JN., Lee, DG. (2016). Forensic Approach for Data Collection in Guest Domain Based on Mobile Hypervisor. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_47
Download citation
DOI: https://doi.org/10.1007/978-981-10-1536-6_47
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-1535-9
Online ISBN: 978-981-10-1536-6
eBook Packages: Computer ScienceComputer Science (R0)