search query: @keyword virtualization / total: 24
reference: 8 / 24
« previous | next »
Author:Zengin, Onur
Title:Virtualized mobile platform security with dynamic policy updating
Publication type:Master's thesis
Publication year:2014
Pages:ix + 101      Language:   eng
Department/School:Perustieteiden korkeakoulu
Main subject:Tietokoneverkot   (T-110)
Supervisor:Aura, Tuomas
Instructor:Sovio, Sampo ; Ekberg, Jan-Erik
Electronic version URL: http://urn.fi/URN:NBN:fi:aalto-201507013718
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark Aalto  1718   | Archive
Keywords:virtualization
hypervisor
mobile security
security policy enforcement
platform security
Abstract (eng): Security by virtualization in mobile devices is more and more relevant after the recent issues revealed in cases known as Snowden leaks, Heartbleed and Apple's SSL goto bug.
Monolithic operating systems have large code bases, which makes it difficult to detect such issues and to limit damage by isolating parts of the system to different security domains.
For this reason, new security architectures are increasingly placed one layer below the operating system.
Separating of the execution to isolated domains with a lightweight component, such as a hypervisor, which runs on a higher privilege level below the operating system, makes it easier for enterprise security professionals to maintain and control the secure systems.

When vulnerabilities are found in system software, the software vendor, equipment manufacturers, and users or system administrators need to respond quickly and update the software.
This is especially the case for the fast-changing mobile computing environments.
Unfortunately, the development and validation of the recovery patches takes time, and the simultaneous distribution of the gigabyte sized fresh system images to millions of devices causes' massive data traffic.
Moreover, patching mobile devices, which are on the move, may cause excessive battery and cellular data consumption.
Nevertheless, response time is critical in the case of mobile client security.

In this thesis, we propose a mobile security architecture which utilizes low-level full virtualization with dynamic security updates.
The updates are in the form of policies, which are efficient to develop and distribute due to their minimal size.
The work includes the definition, implementation of proof-of-concept, and security evaluation of the proposed architecture.
This architecture enables enterprise security professionals to maintain and deploy standard system images across their organization, and to respond to security issues rapidly and independently from the software vendor or equipment manufacturers.
ED:2014-06-30
INSSI record number: 49354
+ add basket
« previous | next »
INSSI