Advertisement

Desired Security Features

  • Amit VasudevanEmail author
  • Jonathan M. McCune
  • James Newsome
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

Here we describe a set of features intended to enable secure execution on mobile devices. This can be interpreted as the wish-list for a security-conscious application developer. The strength of these features can typically be measured by the size, complexity, and attack surface of the components that must be relied upon for a given security property to hold. This is often referred to as the trusted computing base (TCB).

Copyright information

© The Author(s) 2014

Authors and Affiliations

  • Amit Vasudevan
    • 1
    Email author
  • Jonathan M. McCune
    • 1
  • James Newsome
    • 1
  1. 1.Carnegie Mellon University, CyLabPittsburghUSA

Personalised recommendations