Skip to main content

Hochsichere Smartphones mit L4Android

  • Chapter
  • First Online:
Smart Mobile Apps

Part of the book series: Xpert.press ((XPERT.PRESS))

  • 12k Accesses

Zusammenfassung

Smartphones vermitteln uns das Gefühl rund um die Uhr vernetzt zu sein. Für viele Anwender sind Smartphones das primäre Kommunikationsgerät geworden. Große Firmen investieren mittlerweile viel Geld, um mit Smartphones neue Geschäftsfelder zu erschließen. Die neuen Anwendungen, wie z. B. Mobile Payment, haben hohe Anforderungen an die Gerätesicherheit. Vorhandene Smartphonebetriebssysteme sind diesen Anforderungen nicht gewachsen. In dieser Arbeit stellen wir L4Android vor. L4Android ist ein Betriebssystemframework, welches das Erstellen sicherer Smartphonearchitekturen ermöglicht. Wir verwenden einen modernen Mikrokern und erlauben das Ausführen von nicht sicherheitskritischer Software in einer virtuellen Maschine.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 69.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://os.inf.tu-dresden.de/fiasco/.

  2. 2.

    http://os.inf.tu-dresden.de/L4Re/.

  3. 3.

    http://l4linux.org.

  4. 4.

    http://l4android.org.

References

  1. Canalys (2011) Android increases smart phone market leadership with 35 percent share. http://canalys.com/pr/2011/r2011051.html 26. Oktober 2011

  2. Beresford AR, Rice A, Skehin N, Sohan R (2011) MockDroid: trading privacy for application functionality on smartphones. In: 12th Workshop on Mobile Computing Systems and Applications

    Google Scholar 

  3. Muthukumaran D, Sawani A, Schiffman J, Jung BM, Jaeger T (2008) Measuring integrity on mobile phone systems. In: Proceedings of the 13th ACM symposium on Access control models and technologies, ACM, New York, NY, USA, SACMAT '08, pp 155–164, DOI: http://doi.acm.org/10.1145/1377836.1377862, http://doi.acm.org/10.1145/1377836.1377862 26. Oktober 2011

  4. Enck W, Gilbert P, Chun B-G, Cox LP, Jung J, McDaniel P, Sheth AN (2010) TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX conference on Operating systems design and implementation, USENIX Association, Berkeley, CA, USA, OSDI'10, pp 1–6, http://portal.acm.org/citation.cfm?id=1924943.1924971 26. Oktober 2011

  5. Portokalidis G, Homburg P, Anagnostakis K, Bos H (2010) Paranoid Android: versatile protection for smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference, ACM, New York, NY, USA, ACSAC '10, pp 347–356, DOI: http://doi.acm.org/10.1145/1920261.1920313, http://doi.acm.org/10.1145/1920261.1920313 26. Oktober 2011

  6. Xie L, Zhang X, Seifert J-P, Zhu S (2010) pBMDS: a behavior-based malware detection system for cellphone devices. In: Proceedings of the third ACM conference on Wireless network security, ACM, New York, NY, USA, WiSec '10, pp 37–48, DOI: http://doi.acm.org/10.1145/1741866.1741874, http://doi.acm.org/10.1145/1741866.1741874 26. Oktober 2011

  7. Zhou Y, Zhang X, Jiang X, Freeh VW (2011) Software Creates Privacy Mode To Help Secure Android Smartphones. http://news.ncsu.edu/releases/wms-jiang-tissa/ 26. Oktober 2011

  8. Zhang X, Seifert JP, Acicmez O (2010) SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms. In: Information and Communications Security, Springer Berlin / Heidelberg, Lecture Notes in Computer Science, vol 6476, pp 107–125, http://dx.doi.org/10.1007/978-3-642-17650-0_9 26. Oktober 2011

  9. Coverity Inc (2010) Coverity Scan 2010 Open Source Integrity Report. http://www.coverity.com/html/press/coverity-scan-2010-report-reveals-high-risk-software-flaws-in-android.html 17. Mai 2011

  10. Becher M, Freiling FC, Hoffmann J, T Holz SU, Wolf C (2011) Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices. In: Proceedings of the IEEE Symposium on Security and Privacy

    Google Scholar 

  11. Google Inc (2011) Distribution of Android Versions. http://developer.android.com/resources/dashboard/platform-versions.html 26. Oktober 2011

  12. Barrera D, Kayacik HG, van Oorschot PC, Somayaji A (2010) A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM conference on Computer and communications security, ACM, New York, NY, USA, CCS '10, pp 73–84, DOI: http://doi.acm.org/10.1145/1866307.1866317, http://doi.acm.org/10.1145/1866307.1866317 26. Oktober 2011

  13. Enck W, Octeau D, Mcdaniel P, Chaudhuri S (2011) A Study of Android Application Security. In: Proceedings of the 20th USENIX Security Symposium

    Google Scholar 

  14. D Maslennikov (2011) Malware in the Android Market: here we go again. http://www.securelist.com/en/blog/11267/Malware_in_the_Android_Market_here_we_go_again 26. Oktober 2011

  15. Mahaffey K (2011) Security Alert: DroidDream Malware Found in Official Android Market. http://blog.mylookout.com/2011/03/ security-alert-malware-found-in-official-android-market-droiddream/ 12. April 2011

  16. Droid Life: A Droid Community Blog (2011) Motorola Eases Up on Locked Bootloader Stance, Plans to Unlock Portfolio in 2011? http://www.droid-life.com/2011/04/26/motorola-eases-up-on-locked-bootloader-stance-plans-to-unlock-portfolio-in-2011/ 26. Oktober 2011

  17. Chou P (2011) HTC to open bootloaders. https://www.facebook.com/HTC/posts/10150307320018084 26. Oktober 2011

  18. DroidDream (2011) http://www.androidpolice.com/2011/03/01/the-mother-of-all-android-malware-has-arrived-stolen-apps-released-to-the-market-that-root-your-phone-steal-your-data-and-open-backdoor/ 26. Oktober 2011

    Google Scholar 

  19. Bishop M (2003) Computer Security: Art and Science. Addison-Wesley

    Google Scholar 

  20. Loscocco P, Smalley S (2001) Integrating Flexible Support For Security Policies Into The Linux Operating System. In: Proceedings of the FREENIX Track of the 2001 USENIX Annual Technical Conference

    Google Scholar 

  21. Elad B, Eli B, Nathan K (2007) Instant Ciphertext – Only Cryptanalysis of GSM Encrypted Communication. J Crypt 21(3):392–429

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Steffen Liebergeld , Matthias Lange , Adam Lackorzynski or Alexander Warg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Liebergeld, S., Lange, M., Lackorzynski, A., Warg, A. (2012). Hochsichere Smartphones mit L4Android. In: Verclas, S., Linnhoff-Popien, C. (eds) Smart Mobile Apps. Xpert.press. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22259-7_15

Download citation

Publish with us

Policies and ethics