How secure are current mobile operating systems?

被引:0
|
作者
Murmann, T [1 ]
Rossnagel, H [1 ]
机构
[1] Univ Frankfurt, Chair Mobile Commerce & Multilateral Secur, D-60054 Frankfurt, Germany
来源
关键词
mobile operating systems; trusted devices;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There are numerous initiatives to use mobile devices as so-called "trusted pocket signers" to produce electronic signatures. The actual signature is generated by means of a conventional signature card. The mobile device serves as the card reader, storage device for the document to be signed and as a display for the signature application. The operating system used on the mobile device has thus a pivotal importance to ensure the integrity and accountability of the electronic signature. Also mobile devices are used to provide mobile workers with access to the corporate backend. We examined the currently available mobile operating systems in regard to their security and conclude that not a single one is secure enough for "trusted" signing and only partially for secure backend access. We show two possible ways of how to make mobile devices more secure and possibly to enable something close to "what you see is what you sign".
引用
收藏
页码:47 / 58
页数:12
相关论文
共 50 条
  • [11] Error Monitoring for Mobile Operating Systems
    Carabas, Costin
    Patru, Irina-Ioana
    Carabas, Mihai
    Gheorghe, Laura
    Tapus, Nicolae
    2015 9TH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS CISIS 2015, 2015, : 302 - 307
  • [12] Protection Software for Mobile Operating Systems
    Omelchenko, Tatiana
    Nikishova, Arina
    Umnitsyn, Mikhail
    Sadovnikova, Natalia
    Parygin, Danila
    Kostyukov, Aleksandr
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 54 - 59
  • [13] Can we make operating systems reliable and secure?
    Tanenbaum, AS
    Herder, JN
    Bos, H
    COMPUTER, 2006, 39 (05) : 44 - +
  • [14] Design of secure operating systems with high security levels
    Qing Sihan
    Shen ChangXiang
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2007, 50 (03): : 399 - 418
  • [15] A Secure Architecture for Operating System-Level Virtualization on Mobile Devices
    Huber, Manuel
    Horsch, Julian
    Velten, Michael
    Weiss, Michael
    Wessel, Sascha
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015, 2016, 9589 : 430 - 450
  • [16] Design of secure operating systems with high security levels
    SiHan Qing
    ChangXiang Shen
    Science in China Series F: Information Sciences, 2007, 50 : 399 - 418
  • [17] Design of secure operating systems with high security levels
    QING SiHan1
    2 School of Software and Microelectronics
    3 Institute of Computing Technology
    ScienceinChina(SeriesF:InformationSciences), 2007, (03) : 399 - 418
  • [18] Support for Secure Code Execution in Server Operating Systems
    Bhuse, Vijay
    Hekhuis, Kyle
    PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 21 - 30
  • [19] A New Methodology for the Development of Secure and Paranoid Operating Systems
    Mateus-Coelho, Nuno
    INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS / INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT / INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES 2020 (CENTERIS/PROJMAN/HCIST 2020), 2021, 181 : 1207 - 1215
  • [20] A solution of secure communication in the current and future mobile network
    Li, D
    Yang, YX
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1438 - 1445