Title: | Mobile and Embedded Platform Security |
Author(s): | Reshetova, Elena |
Date: | 2018 |
Language: | en |
Pages: | 58 + app. 99 |
Department: | Tietotekniikan laitos Department of Computer Science |
ISBN: | 978-952-60-8114-4 (electronic) 978-952-60-8113-7 (printed) |
Series: | Aalto University publication series DOCTORAL DISSERTATIONS, 144/2018 |
ISSN: | 1799-4942 (electronic) 1799-4934 (printed) 1799-4934 (ISSN-L) |
Supervising professor(s): | Asokan, N., Prof., Aalto University, Department of Computer Science, Finland |
Subject: | Computer science |
Keywords: | platform security, Linux OS security |
Archive | yes |
|
|
Abstract:The number of various mobile and embedded devices around us is growing very rapidly. Nowadays they are employed in many areas, such as automotive, industry automation, healthcare, smart home systems etc. At the same time, the number of attacks targeting these devices and associated infrastructure is also growing. The long history of information and device protection in the PC world has developed a set of hardware and software mechanisms, commonly refereed as platform security, to withstand these attacks. However, they are usually not very well suited for mobile and embedded devices. As a result new platform security architectures for mobile and embedded device platforms were designed and widely employed.
|
|
Parts:[Publication 1]: Kostiainen, Kari and Reshetova, Elena and Ekberg, Jan-Erik and Asokan, N. Old, new, borrowed, blue: a perspective on the evolution of mobile platform security architectures. In Proceedings of the First ACM Conference on Data and Application Security and Privacy, San Antonio, USA, pages 13–24, February 2011. DOI: 10.1145/1943513.1943517 View at Publisher [Publication 2]: Reshetova, Elena and Bonazzi, Filippo and Nyman, Thomas and Borgaonkar, Ravishankar and Asokan, N. Characterizing SEAndroid Policies in the Wild. In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, Rome, Italy, pages 482–489, February 2016. DOI: 10.5220/0005759204820489 View at Publisher [Publication 3]: Reshetova, Elena and Bonazzi, Filippo and and Asokan, N. SELint: an SEAndroid policy analysis tool. In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, Porto, Portugal, pages 47–58, February 2017.[Publication 4]: Reshetova, Elena and Karhunen, Janne and Nyman, Thomas and Asokan, N. Security of OS-Level Virtualization Technologies. In Bernsmed K., Fischer-Hübner S. (eds) Secure IT Systems. NordSec 2014. Lecture Notes in Computer Science, vol 8788, Tromsø, Norway, pages 77-93, October 2014. DOI: 10.1007/978-3-319-11599-3_5 View at Publisher [Publication 5]: Reshetova, Elena and Bonazzi, Filippo and Asokan, N. Randomization Can’t Stop BPF JIT Spray. In Yan Z., Molva R., Mazurczyk W., Kantola R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science, vol 10394, Helsinki, Finland, pages 233-247, August 2017.[Publication 6]: Reshetova, Elena and Liljestrand, Hans and Paverd, Andrew and Asokan, N. Towards Linux Kernel Memory Safety. Accepted for publication in Software: Practice and Experience, August 2018. |
|
|
Unless otherwise stated, all rights belong to the author. You may download, display and print this publication for Your own personal use. Commercial use is prohibited.
Page content by: Aalto University Learning Centre | Privacy policy of the service | About this site