- To enhance trustworthiness of commodity mobile devices via implementing
- a user-centric trust anchor with a secure user-anchor interface
- a security framework based on the trust anchor for users to protect critical resources in an on-demand fashion
Existing Solutions and their Limitations
- TrustZone based approach: inflexible, coarse-granularity, requires hardware manufacturer support
- Microkernel based approach: not compatible with commodity systems; higher overhead
- Existing solutions are not user centric
Outcomes / Deliverables
- MID-TERM: A hypervisor enforcing inter-process information flow control with self-protection on availability and integrity
- FINAL: Trust-anchor with secure user interface; security framework based on the trust-anchor supporting secure execution environment, device control, I/O data protection and user data protection
Practical Applications and Impact
- Deployable for mobile phones with ARM architecture
- Potential to create highly secure mobile platforms for niche market
Significant Research Achievements
- We have come up with a preliminary design of the secure hypervisor-user interface. Since our hypervisor-based device protection is user driven, our research so far has addressed the user’s trust establishment on the hypervisor. We have come up with a preliminary design on this regard.
Last updated on 09 Jun 2017 .