Corpus ID: 231802327

Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones

@article{Groschupp2021SovereignST,
  title={Sovereign Smartphone: To Enjoy Freedom We Have to Control Our Phones},
  author={Friederike Groschupp and M. Schneider and I. Puddu and S. Shinde and S. Capkun},
  journal={ArXiv},
  year={2021},
  volume={abs/2102.02743}
}
The majority of smartphones either run iOS or Android operating systems. This has created two distinct ecosystems largely controlled by Apple and Google—they dictate which applications can run, how they run, and what kind of phone resources they can access. Barring some exceptions in Android where different phone manufacturers may have influence, users, developers, and governments are left with little to no choice. Specifically, users need to entrust their security and privacy to OS vendors and… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 52 REFERENCES
SANCTUARY: ARMing TrustZone with User-space Enclaves
  • 37
  • PDF
Cells: a virtual mobile smartphone architecture
  • 218
  • PDF
Fidelius: Protecting User Secrets from Compromised Browsers
  • 17
  • PDF
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks
  • 178
  • PDF
Cloak and Dagger: From Two Permissions to Complete Control of the UI Feedback Loop
  • 74
  • PDF
SeCloak: ARM Trustzone-based Mobile Peripheral Control
  • 19
  • PDF
Android Rooting: Methods, Detection, and Evasion
  • 28
  • PDF
Keystone: an open framework for architecting trusted execution environments
  • 40
  • Highly Influential
  • PDF
Meltdown: Reading Kernel Memory from User Space
  • 502
  • PDF
Sanctorum: A lightweight security monitor for secure enclaves
  • 10
  • PDF
...
1
2
3
4
5
...