Skip to main content

Forensic Approach for Data Collection in Guest Domain Based on Mobile Hypervisor

  • Conference paper
  • First Online:
Advanced Multimedia and Ubiquitous Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 393))

  • 1081 Accesses

Abstract

A variety of new security technology has emerged in the mobile security area recently, especially domain isolation technique is widely used, such as TrustZone, Samsung KNOX, etc. By storing user sensitive information and business data in a secure domain, which is isolated from normal domain, may not be exposed to unexpected security accident or unauthorized access. When the security incidents occurred on these devices, it might be impossible to collect data from secure domain, because common forensic tools cannot be accessed in isolated domain. Therefore, it is necessary to research data collection techniques on the device based on domain separation technology. This paper discusses data collection techniques in the secure domain applied by mobile hypervisor-based separation technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Frenzel T, Lackorzynski A, Warg A, Härtig H (2010) ARM TrustZone as a virtualization technique in embedded systems. In: 12th real-time linux workshop

    Google Scholar 

  2. Samsung KNOX from Wikipedia. https://en.wikipedia.org/wiki/Samsung_Knox

  3. Kim Y, Lee Y, Kim J (2012) TeeMo: a generic trusted execution framework for mobile devices. In: International conference on computer, networks, systems, and industrial applications (CNSI), pp 579–583

    Google Scholar 

  4. Andrus J, Dall C, Van’t Hof A, Laadan O, Nieh J (2011) Cells: a virtual mobile smartphone architecture. In: Proceedings of the 23th ACM symposium on operating systems principles

    Google Scholar 

  5. Kim K, Kim C, Jung S, Shin H, Kim J (2008) Inter-domain socket communications supporting high performance and full binary compatibility on Xen. In: Proceedings of the fourth ACM SIGPLAN/SIGOPS, pp 11–20

    Google Scholar 

  6. Colp P, Nanavati M, Zhu J, Aiello W, Coker G, Deegan T, Loscocco P, Warfield A (2011) Breaking up is hard to do: security and functionality in a commodity hypervisor. In: Proceedings of 23rd ACM symposium on operating systems principles

    Google Scholar 

  7. Lim K, Jeon Y, Kim J, Lee D (2015) A methodology for live forensic acquisition in secure domain based on domain separation technology. Adv Comput Commun Eng Technol 362:1113–1123

    Google Scholar 

  8. Lim K, Park S, Kim J, Lee D (2015) Functional considerations in military-grade security platform using a mobile hypervisor. Comput Sci Appl Lect Notes Electr Eng 330:1413–1418

    Google Scholar 

Download references

Acknowledgments

Foundation item: This work was supported by the ICT R&D program of MSIP/IITP, Korea. [R0101-15-0195(10043959), Development of EAL 4 level military fusion security solution for protecting against unauthorized accesses and ensuring a trusted execution environment in mobile devices]

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kyung-Soo Lim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Lim, KS., Kim, JN., Lee, DG. (2016). Forensic Approach for Data Collection in Guest Domain Based on Mobile Hypervisor. In: Park, J., Jin, H., Jeong, YS., Khan, M. (eds) Advanced Multimedia and Ubiquitous Engineering. Lecture Notes in Electrical Engineering, vol 393. Springer, Singapore. https://doi.org/10.1007/978-981-10-1536-6_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-1536-6_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-1535-9

  • Online ISBN: 978-981-10-1536-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics