Secure Containers in Android: The Samsung KNOX Case Study

  title={Secure Containers in Android: The Samsung KNOX Case Study},
  author={Uri Kanonov and A. Wool},
  journal={Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices},
  • Uri Kanonov, A. Wool
  • Published 2016
  • Computer Science
  • Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices
Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and productivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever-growing. Such dangers can be mitigated by running the enterprise software inside a "secure container" on the smartphone. In our work we present a systematic assessment of security critical areas in design and implementation of a secure container for Android using reverse… Expand
An empirical performance and security evaluation of android container solutions
  • Tianhui Meng, Zhihao Shang, K. Wolter
  • Engineering, Computer Science
  • 2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security)
  • 2017
Security analysis of Samsung Knox
Analysis of Trusted Execution Environment usage in Samsung KNOX
Multi-level Isolation for Android Applications
  • Guillaume Averlant
  • Computer Science
  • 2017 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)
  • 2017
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System
POSTER: DroidShield: Protecting User Applications from Normal World Access
A root privilege management scheme with revocable authorization for Android devices


Bring Your Own Device: Benefits, risks and control techniques
Secure containers in Android: the Samsung KNOX case study
  • Technical Report arXiv:1605.08567 [cs.CR],,
  • 2016
A review of Android for Work: Dual-persona support comes to Android
  • 2015
  • informationsecurity/byod-mobile-security-report,
  • 2014
BYOD & Mobile Security report
  • 2014