Survivable mobile operating system
MetadataShow full item record
Although there is a large body of work on cryptographic techniques and algorithms that provide basic building blocks to solve specific security problems, relatively little work has been done in investigating security issues in mobile system contexts. Conventional security controls work well for static code, but break down with code mobility. In this paper, we investigate the need for end-to-end security in mobile and wireless operating systems. We study the implications of mobility - specifically, ways in which the operating system may facilitate communication security. We suggest a framework for designing security into mobile devices by building encryption into the mobile device thus providing end-to-end security and eliminating carrier-provided encryption overhead.