Bibliographic Details
| Title: |
TSSDroid: realization of an efficient and usable TSS API for the Android software stack. |
| Authors: |
Khan, Sohail, Nauman, Mohammad, Othman, Abu Talib, Musa, Shahrulniza, Syed, Toqeer Ali |
| Source: |
Security & Communication Networks; 7/25/2016, Vol. 9 Issue 11, p1553-1576, 24p |
| Subject Terms: |
SMARTPHONES, MALWARE, DATA security, CYBERTERRORISM, APPLICATION program interfaces, COMPUTER systems |
| Abstract: |
The advancement in smartphones capabilities has attracted malware writers to build more sophisticated attacks on these devices. Traditional software-based security mechanisms have failed to provide strong security against these attacks. Similar threats on the PC have been countered using the concepts of Trusted Computing-a highly flexible trust mechanism with strong security properties. However, smartphone platforms have yet to see any Trusted Computing applications-primarily because of the difficulty in adopting this relatively new paradigm of security. In this paper, we present the design of a high-level application programming interface (API) that allows Android-based smartphone application developers to adopt Trusted Computing and use it in their applications without having to learn the intricate details of how Trusted Computing works. The API abstracts away the complexity in using Trusted Computing constructs by offering easy-to-use interfaces for complex tasks. The API has enhanced the usability of Trusted Computing development by significantly reducing the number of lines and complexity of code required to perform these diverse tasks. This paper provides a reference implementation for the proposed API in order to show that the API is efficient in terms of performance overhead. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR] |
|
Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Database: |
Complementary Index |