Emulating Trust Zone in Android Emulator with Secure Channeling
2013 (English)In: International Journal of Computer Science Issues, ISSN 1694-0784, E-ISSN 1694-0814, Vol. 10, no 5, 40-51 p.Article in journal (Refereed) Published
There is a raise in penetration of smart phone while using enterprise application, as most of them are downloaded from the public market, resulting in challenge for security framework, causing a threat to lose sensitive user data. To prevent this ARM introduces the virtualization technique in hardware level, which prevents processing of trusted application that is completely isolated from general processing. To improvise this, we need to understand ARM Architecture; however it is still black box for users and developers. In this article, we take a deep look at the hardware architecture of the ARM trust zone to study and analyze its implementation and also to create its replica in emulator. Moreover we describe feasibility of various designs, implementation of trust zone feature in android emulator; with sample trusted application called secure channeling and concludes with annotation of suitable design on future enhancement. The security domain for secure processing and utility in emulator is to benefit the user and developer community.
Place, publisher, year, edition, pages
2013. Vol. 10, no 5, 40-51 p.
Trust zone, Emulator, Android, Virtualization, Security and secure channeling.
Research subject Computer and Systems Sciences
IdentifiersURN: urn:nbn:se:su:diva-97723OAI: oai:DiVA.org:su-97723DiVA: diva2:679953