Overview of Mobile Containerization Approaches and Open Research Directions

When a mobile device is used for both personal and business purposes, securing enterprise content and preserving employees' privacy are vital. Containerization is a promising approach to address such requirements.

[1]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[2]  C. Gehrmann Mobile Platform Security , 2006 .

[3]  N. Asokan,et al.  Security of OS-Level Virtualization Technologies , 2014, NordSec.

[4]  Lujo Bauer,et al.  More than skin deep: measuring effects of the underlying model on access-control system usability , 2011, CHI.

[5]  Jeremy Andrus,et al.  Cells: a virtual mobile smartphone architecture , 2011, SOSP '11.

[6]  Elisa Bertino,et al.  IdentiDroid: Android can finally Wear its Anonymous Suit , 2014, Trans. Data Priv..

[7]  Nicolas Christin,et al.  All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.

[8]  Elisa Bertino,et al.  Adaptive data protection in distributed systems , 2013, CODASPY.

[9]  Yuval Elovici,et al.  Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.

[10]  Mauro Conti,et al.  CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.

[11]  Ahmad-Reza Sadeghi,et al.  Privilege Escalation Attacks on Android , 2010, ISC.

[12]  Seungyeop Han,et al.  These aren't the droids you're looking for: retrofitting android to protect data from imperious applications , 2011, CCS '11.

[13]  Steven Furnell,et al.  The challenges of understanding and using security: A survey of end-users , 2006, Comput. Secur..

[14]  Clare-Marie Karat,et al.  Usable security and privacy: a case study of developing privacy management tools , 2005, SOUPS '05.

[15]  Neal Leavitt Today's Mobile Security Requires a New Approach , 2013, Computer.

[16]  Slim Trabelsi,et al.  Sticky policies for mobile devices , 2013, SACMAT '13.

[17]  David W. Chadwick,et al.  Enforcing "sticky" security policies throughout a distributed application , 2008, MidSec '08.

[18]  Bill Morrow,et al.  BYOD security challenges: control and protect your most sensitive data , 2012, Netw. Secur..

[19]  Elisa Bertino,et al.  Context-Based Access Control Systems for Mobile Devices , 2015, IEEE Transactions on Dependable and Secure Computing.

[20]  Claudia Eckert,et al.  Improving mobile device security with operating system-level virtualization , 2015, Comput. Secur..

[21]  Hormazd Romer,et al.  Best practices for BYOD security , 2014 .

[22]  Lujo Bauer,et al.  User-Controllable Security and Privacy for Pervasive Computing , 2007, Eighth IEEE Workshop on Mobile Computing Systems and Applications.

[23]  Alexander Varshavsky,et al.  Enabling Secure and Spontaneous Communication between Mobile Devices using Common Radio Environment , 2007 .