Mobile Platform Security
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.
1116510511
Mobile Platform Security
Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.
37.99 In Stock
Mobile Platform Security

Mobile Platform Security

Mobile Platform Security

Mobile Platform Security

Paperback

$37.99 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

Related collections and offers


Overview

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.

Product Details

ISBN-13: 9783031012136
Publisher: Springer International Publishing
Publication date: 01/10/2014
Series: Synthesis Lectures on Information Security, Privacy, and Trust
Pages: 96
Product dimensions: 7.52(w) x 9.25(h) x (d)

About the Author

Asokan is a Professor at Aalto University and the University of Helsinki. He joined academia recently after a long spell in industrial research at Nokia Research Center and IBM Research. Asokan holds a doctorate in computer science from the University of Waterloo and is an Associate Editor of ACM Transactions on Information and System Security (TISSEC). He is the Lead Academic Principal Investigator for the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at the University of Helsinki.
Lucas is a research assistant at the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at Technische Universitat Darmstadt, Germany. He received his M.Sc. in IT Security from Ruhr-University Bochum, Germany. His current research focuses on runtime attacks such as return-oriented programming (ROP) for ARM and Intel-based systems. He is working on new attack methods and countermeasures against runtime attacks. His further research areas include mobile operatingsystem security and Trusted Computing.
Lucas is a research assistant at the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at Technische Universitat Darmstadt, Germany. He received his M.Sc. in IT Security from Ruhr-University Bochum, Germany. His current research focuses on runtime attacks such as return-oriented programming (ROP) for ARM and Intel-based systems. He is working on new attack methods and countermeasures against runtime attacks. His further research areas include mobile operating system security and Trusted Computing.
Stephan is a research assistant at the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at Technische Universitat Darmstadt, Germany. He received his diploma (M.Sc.) in computer science from Technische Universität Darmstadt, Germany. Before joining ICRI-SC Stephan was employed by Fraunhofer Institute for Secure Information Technology (SIT) in Darmstadt, Germany, where he focused on operating system and application security for mobile devices, network security, and trusted computing. His current research mainly focuses on access control architectures for mobile devices, such as BizzTrust and FlaskDroid security architectures for Android.

Table of Contents

Preface.- Introduction.- Platform Security Model.- Mobile Platforms.- Platform Comparison.- Mobile Hardware Security.- Enterprise Security Extensions.- Platform Security Research.- Conclusions.- Bibliography.- Authors' Biographies .
From the B&N Reads Blog

Customer Reviews