TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Gespeichert in:
| Titel: | TSSDroid: realization of an efficient and usable TSS API for the Android software stack. |
|---|---|
| Autoren: | Khan, Sohail, Nauman, Mohammad, Othman, Abu Talib, Musa, Shahrulniza, Syed, Toqeer Ali |
| Quelle: | Security & Communication Networks; 7/25/2016, Vol. 9 Issue 11, p1553-1576, 24p |
| Schlagwörter: | SMARTPHONES, MALWARE, DATA security, CYBERTERRORISM, APPLICATION program interfaces, COMPUTER systems |
| Abstract: | The advancement in smartphones capabilities has attracted malware writers to build more sophisticated attacks on these devices. Traditional software-based security mechanisms have failed to provide strong security against these attacks. Similar threats on the PC have been countered using the concepts of Trusted Computing-a highly flexible trust mechanism with strong security properties. However, smartphone platforms have yet to see any Trusted Computing applications-primarily because of the difficulty in adopting this relatively new paradigm of security. In this paper, we present the design of a high-level application programming interface (API) that allows Android-based smartphone application developers to adopt Trusted Computing and use it in their applications without having to learn the intricate details of how Trusted Computing works. The API abstracts away the complexity in using Trusted Computing constructs by offering easy-to-use interfaces for complex tasks. The API has enhanced the usability of Trusted Computing development by significantly reducing the number of lines and complexity of code required to perform these diverse tasks. This paper provides a reference implementation for the proposed API in order to show that the API is efficient in terms of performance overhead. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR] |
| Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) | |
| Datenbank: | Complementary Index |
| FullText | Text: Availability: 0 CustomLinks: – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Khan%20S Name: ISI Category: fullText Text: Nájsť tento článok vo Web of Science Icon: https://imagesrvr.epnet.com/ls/20docs.gif MouseOverText: Nájsť tento článok vo Web of Science |
|---|---|
| Header | DbId: edb DbLabel: Complementary Index An: 116123712 RelevancyScore: 853 AccessLevel: 6 PubType: Academic Journal PubTypeId: academicJournal PreciseRelevancyScore: 853.196594238281 |
| IllustrationInfo | |
| Items | – Name: Title Label: Title Group: Ti Data: TSSDroid: realization of an efficient and usable TSS API for the Android software stack. – Name: Author Label: Authors Group: Au Data: <searchLink fieldCode="AR" term="%22Khan%2C+Sohail%22">Khan, Sohail</searchLink><br /><searchLink fieldCode="AR" term="%22Nauman%2C+Mohammad%22">Nauman, Mohammad</searchLink><br /><searchLink fieldCode="AR" term="%22Othman%2C+Abu+Talib%22">Othman, Abu Talib</searchLink><br /><searchLink fieldCode="AR" term="%22Musa%2C+Shahrulniza%22">Musa, Shahrulniza</searchLink><br /><searchLink fieldCode="AR" term="%22Syed%2C+Toqeer+Ali%22">Syed, Toqeer Ali</searchLink> – Name: TitleSource Label: Source Group: Src Data: Security & Communication Networks; 7/25/2016, Vol. 9 Issue 11, p1553-1576, 24p – Name: Subject Label: Subject Terms Group: Su Data: <searchLink fieldCode="DE" term="%22SMARTPHONES%22">SMARTPHONES</searchLink><br /><searchLink fieldCode="DE" term="%22MALWARE%22">MALWARE</searchLink><br /><searchLink fieldCode="DE" term="%22DATA+security%22">DATA security</searchLink><br /><searchLink fieldCode="DE" term="%22CYBERTERRORISM%22">CYBERTERRORISM</searchLink><br /><searchLink fieldCode="DE" term="%22APPLICATION+program+interfaces%22">APPLICATION program interfaces</searchLink><br /><searchLink fieldCode="DE" term="%22COMPUTER+systems%22">COMPUTER systems</searchLink> – Name: Abstract Label: Abstract Group: Ab Data: The advancement in smartphones capabilities has attracted malware writers to build more sophisticated attacks on these devices. Traditional software-based security mechanisms have failed to provide strong security against these attacks. Similar threats on the PC have been countered using the concepts of Trusted Computing-a highly flexible trust mechanism with strong security properties. However, smartphone platforms have yet to see any Trusted Computing applications-primarily because of the difficulty in adopting this relatively new paradigm of security. In this paper, we present the design of a high-level application programming interface (API) that allows Android-based smartphone application developers to adopt Trusted Computing and use it in their applications without having to learn the intricate details of how Trusted Computing works. The API abstracts away the complexity in using Trusted Computing constructs by offering easy-to-use interfaces for complex tasks. The API has enhanced the usability of Trusted Computing development by significantly reducing the number of lines and complexity of code required to perform these diverse tasks. This paper provides a reference implementation for the proposed API in order to show that the API is efficient in terms of performance overhead. Copyright © 2016 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR] – Name: Abstract Label: Group: Ab Data: <i>Copyright of Security & Communication Networks is the property of Wiley-Blackwell and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract.</i> (Copyright applies to all Abstracts.) |
| PLink | https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edb&AN=116123712 |
| RecordInfo | BibRecord: BibEntity: Identifiers: – Type: doi Value: 10.1002/sec.1448 Languages: – Code: eng Text: English PhysicalDescription: Pagination: PageCount: 24 StartPage: 1553 Subjects: – SubjectFull: SMARTPHONES Type: general – SubjectFull: MALWARE Type: general – SubjectFull: DATA security Type: general – SubjectFull: CYBERTERRORISM Type: general – SubjectFull: APPLICATION program interfaces Type: general – SubjectFull: COMPUTER systems Type: general Titles: – TitleFull: TSSDroid: realization of an efficient and usable TSS API for the Android software stack. Type: main BibRelationships: HasContributorRelationships: – PersonEntity: Name: NameFull: Khan, Sohail – PersonEntity: Name: NameFull: Nauman, Mohammad – PersonEntity: Name: NameFull: Othman, Abu Talib – PersonEntity: Name: NameFull: Musa, Shahrulniza – PersonEntity: Name: NameFull: Syed, Toqeer Ali IsPartOfRelationships: – BibEntity: Dates: – D: 25 M: 07 Text: 7/25/2016 Type: published Y: 2016 Identifiers: – Type: issn-print Value: 19390114 Numbering: – Type: volume Value: 9 – Type: issue Value: 11 Titles: – TitleFull: Security & Communication Networks Type: main |
| ResultId | 1 |
Nájsť tento článok vo Web of Science