A trusted mobile phone reference architecturevia secure kernel

@inproceedings{Zhang2007ATM,
  title={A trusted mobile phone reference architecturevia secure kernel},
  author={Xinwen Zhang and Onur Aciiçmez and Jean-Pierre Seifert},
  booktitle={STC},
  year={2007}
}
Driven by the ever increasing information security demands in mobile devices, the Trusted Computing Group (TCG) formed a dedicated group - Mobile Phone Working Group (MPWG). to address the security needs of mobile platforms. Along this direction, the MPWG has recently released a Trusted Mobile Phone Reference Architecture Specification. In order to realize trusted mobile platforms, they adapt well-known concepts like TPM, isolation, integrity measurement, etc. from the trusted PC world - with… CONTINUE READING
Highly Cited
This paper has 78 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 39 extracted citations

Trust and Trustworthy Computing

Lecture Notes in Computer Science • 2012
View 3 Excerpts
Highly Influenced

Have Your PI and Eat it Too: Practical Security on a Low-Cost Ubiquitous Computing Platform

2018 IEEE European Symposium on Security and Privacy (EuroS&P) • 2018
View 2 Excerpts

Secure and Flexible Trace-Based Debugging of Systems-on-Chip

ACM Trans. Design Autom. Electr. Syst. • 2016
View 1 Excerpt

Reliable Voice-Based Transactions over VoIP Communications

2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing • 2015
View 1 Excerpt

DroidVault: A Trusted Data Vault for Android Devices

2014 19th International Conference on Engineering of Complex Computer Systems • 2014
View 2 Excerpts

Trusted mobile model based on DTE technology

International Journal of Information Security • 2014
View 1 Excerpt

Trustworthy Execution on Mobile Devices

SpringerBriefs in Computer Science • 2014
View 1 Excerpt

78 Citations

051015'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 78 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-4 of 4 references

Reference policy for security enhanced linux

C. J. PeBenito, F. Mayer, K. MacMillan
In Proc. of SELinux Symposium, • 2006
View 3 Excerpts
Highly Influenced

LOMAC: MAC You Can Live With

USENIX Annual Technical Conference, FREENIX Track • 2001
View 4 Excerpts
Highly Influenced