Abstract
As computing devices such as smartphone are used widely, people conduct their businesses using devices and even enjoy entertainment anywhere. On the other side, worries about privacy or economic damages by cyber attacks are increasing. Although many cyber threats may happen, it is difficult to detect and defend against them before attacks occur, and also it isn’t easy to cope with certain attack by one matching defense technique. One approach to solve these problems is to enhance the security of OS (operating systems). We developed a kernel-level mobile OS security technique, called by DMOS (Deep Mobile OS Security), for secure personal ubiquitous computing. It has deep security ability that blocks attacks layer by layer in a defense-in-depth manner so that important content is protected and essential services can be continued even though attacks intrude into the devices. In order to assess how well DMOS can realize such defense abilities, this paper tries to analyze the resiliency capability of DMOS. Referring to the cyber resiliency framework, we analyze the techniques and the defense effects related to resiliency which DMOS can support along cyber attack cycle. Also, we test the resilient defense ability of DMOS under typical cyber attacks scenarios. From analysis and test results, it can be concluded that DMOS has the resiliency capability to realize deep security for personal ubiquitous computing.
Similar content being viewed by others
References
T. Guo, P. Zhang, H. Liang, S. Shao (2013) Enforcing multiple security policies for android system, In: Proc. of the 2nd International Symposium on Computer, Communication, Control and Automation, pp. 165–169
Draft version 1.1 (2017) Framework for improving critical infrastructure cybersecurity, National Institute of Standards and Technology, pp. 1–57, Jan.
Mobile security R&D program guide, Homeland Security, vol. 1, pp. 1–48
D.J. Bodeau, R.D. Graubart, E.R. Laberman (2014) Cyber resiliency engineering overview of the architectural assessment process, In: Proc. of Conference on Systems Engineering Research (CSER2014), pp. 838–847
ADD (2016) Development specifications for mobile OS security, http://www.add.re.kr
Lee S, Kang T (2015) Adaptive multi-layer security approach for cyber defense. J Internet Comput Serv (JICS) 16(5):1–9
C. Williams, T. Watson et al (2012) Resilient cyber ecosystems, Crosstalk Journal of Defense Software Engineering, vol.25, no.5, US Air Force, Sep./Oct
G. Jakobson (2013) Mission-Centricity in cyber security: architecting cyber attack resilient missions, In: Proc. of the 5th International Conference on Cyber Conflict, pp. 1–18
Goldman HG (2010) Building secure, resilient architectures for cyber mission assurance. MITRE Technical Report, pp.:1–18
J.B. Rice Jr, F. Caniato (2003) Building a secure and resilient supply network, Supply Chain Management Review, Sep/Oct. pp. 22–30
J. Snyder (2006) Six strategies for defense-in-depth, OPUS, pp. 1–9
K. Cox, D. Bodeau, R. Graubart (2015) The cyber resiliency framework: planning for cyber attack survival, MITRE presentation pp. 1–55
S. Wagner, E. van den Berg, J. Giacopelli, P. Manghwani (2012) Autonomous, collaborative control for resilient cyber defense (ACCORD), In: Proc. of IEEE 6th International conference on Self-Adaptive and Self-organizing Systems Workshops, pp. 39–46
Florio VD (2014) Antifragility = elasticity + resilience + machine learning models and algorithms for open system fidelity. Proc Comput Sci 32:834–841
D. Bodeau, R. Graubart, J. Picciotto, R. McQuaid (2011) Cyber resiliency engineering framework, MITRE Technical Report 1–68
D. Bodeau, R. Graubart, W. Heinbockel, E. Laderman (2015) Cyber resiliency engineering aid-the updated cyber resiliency engineering framework and guidance on applying cyber resiliency techniques, MITRE, 1–63
Velazquez C (2015) Detecting and preventing attacks earlier in the kill chain. SANS Institute Infosec Reading Room, pp.:1–21
D. Bodeau, R. Graubart, L. LaPadula, P. Kertzner, A. Rosenthal, J. Brennan (2012) Cyber resiliency metrics, version 1.0, rev. 1, MITRE Technical Report, pp. 1–34
P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M.S. Gaur, M. Conti, M. Rajarajan (2015) Android security: a survey of issues, malware penetration and defense, IEEE Communications Surveys and Tutorials 1–27
Sanghvi HP, Dahiya MS (2013) Cyber reconnaissance: an alarm before cyber attack. Int J Comput Appl 63(6):36–38
B. Schmerl, J. Camara, J. Gennari, D. Garlan, P.Casanova, G.A. Moreno, T.J. Glazier, J.M. Barnes (2014) Architecture based self-protection: composing and reasoning about denial-of-service mitigations, In: Proc. of the 2014 Symposium and Bootcamp on the Science of Security, pp. 1–12
E. Yuan, S. Malek (2012) A taxonomy and survey of self-protecting software systems, In: Proc. of the 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 109–118
J. Newsome, D. Brumley, D. Song (2005) Sting: an end-to-end self-healing system for defending against zero-day worm attacks on commodity software, Carnegie Mellon University pp. 1–27
P. Ramuhalli, M. Halappanavar, J. Coble, M. Dixit (2013) Towards a theory of autonomous reconstitution of compromised cyber-systems, In: Proc. of International Conference: Technologies for Homeland Security (HST), pp. 577–583
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, S., Lee, S., Kang, T. et al. Resiliency of mobile OS security for secure personal ubiquitous computing. Pers Ubiquit Comput 22, 23–34 (2018). https://doi.org/10.1007/s00779-017-1098-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-017-1098-x