Virtualization Techniques for Mobile Systems

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

[1]  Stefan Berger,et al.  Building a MAC-based security architecture for the Xen open-source hypervisor , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[2]  Gernot Heiser,et al.  Virtualizing embedded systems - why bother? , 2011, 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC).

[3]  Johannes Winter,et al.  Trusted computing building blocks for embedded linux-based ARM trustzone platforms , 2008, STC '08.

[4]  Karsten Schwan,et al.  VStore: efficiently storing virtualized state across mobile devices , 2008, MobiVirt '08.

[5]  Mohammad Nauman,et al.  How secure is your smartphone: An analysis of smartphone security mechanisms , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).

[6]  Katrin Hoeper,et al.  Delivering secure applications on commercial mobile devices: the case for bare metal hypervisors , 2011, SPSM '11.

[7]  Adam Lackorzynski,et al.  Taming subsystems: capabilities as universal resource access control in L4 , 2009, IIES '09.

[8]  Andrew Warfield,et al.  Xen and the art of virtualization , 2003, SOSP '03.

[9]  Jeremy Andrus,et al.  Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.

[10]  David Jaramillo,et al.  Mobile innovation applications for the BYOD enterprise user , 2013, IBM J. Res. Dev..

[11]  Ahmad-Reza Sadeghi,et al.  Practical and lightweight domain isolation on Android , 2011, SPSM '11.

[12]  Ankur Agarwal,et al.  A secure extensible container for hybrid mobile applications , 2013, 2013 Proceedings of IEEE Southeastcon.

[13]  Stuart E. Madnick,et al.  Application and analysis of the virtual machine approach to information system security and isolation , 1973, Workshop on Virtual Computer Systems.

[14]  Samir Tata,et al.  Mobile Service Micro-containers for Cloud Environments , 2012, 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[15]  Martin Botteck,et al.  Virtualization as an enabler for security in mobile devices , 2008, IIES '08.

[16]  Jean-Pierre Seifert,et al.  A trusted mobile phone reference architecturevia secure kernel , 2007, STC '07.

[17]  David Jaramillo,et al.  Cooperative solutions for Bring Your Own Device (BYOD) , 2013, IBM J. Res. Dev..

[18]  Larry Rudolph A Virtualization Infrastructure that Supports Pervasive Computing , 2009, IEEE Pervasive Computing.

[19]  Udo Steinberg,et al.  NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.

[20]  Ankur Agarwal,et al.  Virtualization Techniques for Mobile Devices , 2013 .

[21]  Peter M. Chen,et al.  Pocket Hypervisors: Opportunities and Challenges , 2007 .

[22]  Harvey Tuch,et al.  The VMware mobile virtualization platform: is that a hypervisor in your pocket? , 2010, OPSR.

[23]  Jong-Deok Choi,et al.  Fine-grained I/O access control based on xen virtualization for 3G/4G mobile devices , 2010, Design Automation Conference.

[24]  Mache Creeger ACM CTO roundtable on mobile devices in the enterprise , 2011, CACM.

[25]  Dong Xuan,et al.  DiffUser: Differentiated user access control on smartphones , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.

[26]  David Jaramillo,et al.  Cross-platform, secure message delivery for mobile devices , 2013, 2013 Proceedings of IEEE Southeastcon.

[27]  Rahul Ramasubramanian Exploring Virtualization Platforms for ARM based Mobile Android Devices. , 2011 .

[28]  Jason Nieh,et al.  Guest Editors' Introduction: Virtual Machines , 2009, IEEE Pervasive Comput..

[29]  Matthias Lange,et al.  L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.

[30]  Sarah Allen,et al.  Pro Smartphone Cross-Platform Development , 2010 .