Shahbaz Khan, Sanaullah Khan, M. Nauman, T. Ali, Masoom Alam
{"title":"实现移动平台动态行为认证","authors":"Shahbaz Khan, Sanaullah Khan, M. Nauman, T. Ali, Masoom Alam","doi":"10.1145/1838002.1838008","DOIUrl":null,"url":null,"abstract":"Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.","PeriodicalId":434420,"journal":{"name":"International Conference on Frontiers of Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Realizing dynamic behavior attestation for mobile platforms\",\"authors\":\"Shahbaz Khan, Sanaullah Khan, M. Nauman, T. Ali, Masoom Alam\",\"doi\":\"10.1145/1838002.1838008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.\",\"PeriodicalId\":434420,\"journal\":{\"name\":\"International Conference on Frontiers of Information Technology\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Frontiers of Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1838002.1838008\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Frontiers of Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1838002.1838008","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Realizing dynamic behavior attestation for mobile platforms
Modern mobile devices serve as platforms that consume services from multiple service providers. It is vital for such an open cell phone environment to secure the information flows of the stakeholders on the platform. Recent emergence of trusted computing technologies provides a root of trust in hardware, which can be used to construct a chain of trust. This chain of trust can be used to remotely verify that the platform is capable to manage information flows in a trusted manner. This work highlights how trusted computing technologies can be complemented with existing Mandatory Access Control mechanisms to verify the runtime and dynamic behaviors of a platform by using a high level, managerial policy - hence enabling a trustworthy platform with dynamic behavior management.