메뉴 건너뛰기




Volumn 72, Issue , 2018, Pages 145-162

TinyVisor: An extensible secure framework on android platforms

Author keywords

Android; ARM; Hypervisor; System Security; Virtualization

Indexed keywords

ANDROID (OPERATING SYSTEM); BINDERS; BINS; MOBILE PHONES; NETWORK FUNCTION VIRTUALIZATION; VIRTUAL REALITY; VIRTUALIZATION;

EID: 85030787105     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2017.09.006     Document Type: Article
Times cited : (4)

References (48)
  • 1
    • 0012112708 scopus 로고    scopus 로고
    • Architecture Reference Manual (ARMv7-A and ARMv7-R edition)
    • ARM DDI C
    • Architecture Reference Manual (ARMv7-A and ARMv7-R edition). ARM DDI C, 2008.
    • (2008)
  • 2
    • 84867882102 scopus 로고    scopus 로고
    • Towards green data centers: a comparison of x86 and ARM architectures power efficiency
    • Aroca, R.V., Gonçalves, L.M.G., Towards green data centers: a comparison of x86 and ARM architectures power efficiency. J Parall Distrib Comput 72:12 (2012), 1770–1780.
    • (2012) J Parall Distrib Comput , vol.72 , Issue.12 , pp. 1770-1780
    • Aroca, R.V.1    Gonçalves, L.M.G.2
  • 3
    • 84985029117 scopus 로고    scopus 로고
    • Man in the binder: He who controls IPC, controls the droid, Black Hat
    • Artenstein, N., Revivo, I., Man in the binder: He who controls IPC, controls the droid, Black Hat. 2014.
    • (2014)
    • Artenstein, N.1    Revivo, I.2
  • 4
    • 84937551783 scopus 로고    scopus 로고
    • Denial-of-app attack: Inhibiting the installation of android apps on stock phones
    • in: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices
    • Arzt, S., Huber, S., Rasthofer, S., Bodden, E., Denial-of-app attack: Inhibiting the installation of android apps on stock phones. in: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, pp. 21–26, 2014.
    • (2014) , pp. 21-26
    • Arzt, S.1    Huber, S.2    Rasthofer, S.3    Bodden, E.4
  • 5
    • 85030764640 scopus 로고    scopus 로고
    • Fast Models – ARM
    • Available from Accessed 30 August 2015
    • ARM, Fast Models – ARM. Available from http://www.arm.com/products/tools/models/fast-models/, 2011 Accessed 30 August 2015.
    • (2011)
    • ARM1
  • 6
    • 84910673981 scopus 로고    scopus 로고
    • Hypervision across worlds: Real-time kernel protection from the ARM TrustZone secure world
    • in: Proceedings of the 21st ACM Conference on Computer and Communications Security
    • Azab, A.M., Ning, P., Shah, J., Chen, Q., Bhutkar, R., Ganesh, G., et al. Hypervision across worlds: Real-time kernel protection from the ARM TrustZone secure world. in: Proceedings of the 21st ACM Conference on Computer and Communications Security, pp. 1028–1031, 2014.
    • (2014) , pp. 1028-1031
    • Azab, A.M.1    Ning, P.2    Shah, J.3    Chen, Q.4    Bhutkar, R.5    Ganesh, G.6
  • 7
    • 47749115939 scopus 로고    scopus 로고
    • QEMU: a multihost multitarget emulator
    • Bartholomew, D., QEMU: a multihost multitarget emulator. Linux J 2006:145 (2006), 68–71.
    • (2006) Linux J , vol.2006 , Issue.145 , pp. 68-71
    • Bartholomew, D.1
  • 8
    • 85063636742 scopus 로고    scopus 로고
    • QEMU, a fast and portable dynamic translator
    • in: Conference on Usenix Technical Conference
    • Bellard, F., QEMU, a fast and portable dynamic translator. in: Conference on Usenix Technical Conference, pp. 41–46, 2005.
    • (2005) , pp. 41-46
    • Bellard, F.1
  • 9
    • 67650067345 scopus 로고    scopus 로고
    • Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems
    • Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. ACM SIGOPS Operat Syst Rev 42:2 (2010), 2–13.
    • (2010) ACM SIGOPS Operat Syst Rev , vol.42 , Issue.2 , pp. 2-13
    • Chen, X.1    Garfinkel, T.2    Lewis, E.C.3    Subrahmanyam, P.4    Waldspurger, C.A.5    Boneh, D.6
  • 10
    • 84942511833 scopus 로고    scopus 로고
    • Efficient virtualization-based application protection against untrusted operating system
    • in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
    • Cheng, Y., Ding, X., Deng, R.H., Efficient virtualization-based application protection against untrusted operating system. in: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, pp. 345–356, 2015.
    • (2015) , pp. 345-356
    • Cheng, Y.1    Ding, X.2    Deng, R.H.3
  • 11
    • 79961035117 scopus 로고    scopus 로고
    • Analyzing inter-application communication in android
    • in: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services
    • Chin, E., Felt, A.P., Greenwood, K., Wagner, D., Analyzing inter-application communication in android. in: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 239–252, 2011.
    • (2011) , pp. 239-252
    • Chin, E.1    Felt, A.P.2    Greenwood, K.3    Wagner, D.4
  • 12
    • 85030750295 scopus 로고    scopus 로고
    • Kvm for arm
    • Proceedings of the Ottawa Linux Symposium
    • Dall, C., Nieh, J., Kvm for arm. Proceedings of the Ottawa Linux Symposium, 2010.
    • (2010)
    • Dall, C.1    Nieh, J.2
  • 13
    • 84897759668 scopus 로고    scopus 로고
    • KVM/ARM: the design and implementation of the linux ARM hypervisor
    • Available from
    • Dall, C., Nieh, J., KVM/ARM: the design and implementation of the linux ARM hypervisor. ACM SIGARCH Comput Architect News 42:1 (2014), 333–348, 10.1145/2541940.2541946 Available from http://doi.acm.org/10.1145/2541940.2541946.
    • (2014) ACM SIGARCH Comput Architect News , vol.42 , Issue.1 , pp. 333-348
    • Dall, C.1    Nieh, J.2
  • 14
    • 84897815337 scopus 로고    scopus 로고
    • ARMvisor: System virtualization for ARM
    • in: Proceedings of the Ottawa Linux Symposium
    • Ding, J.-H., Lin, C.-J., Chang, P.-H., Tsang, C.-H., Hsu, W.-C., Chung, Y.-C., ARMvisor: System virtualization for ARM. in: Proceedings of the Ottawa Linux Symposium, pp. 93–107, 2012.
    • (2012) , pp. 93-107
    • Ding, J.-H.1    Lin, C.-J.2    Chang, P.-H.3    Tsang, C.-H.4    Hsu, W.-C.5    Chung, Y.-C.6
  • 15
    • 84897681073 scopus 로고    scopus 로고
    • Taintdroid: an information flow tracking system for real-time privacy monitoring on smartphones
    • Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., et al. Taintdroid: an information flow tracking system for real-time privacy monitoring on smartphones. Commun ACM 57:3 (2010), 99–106.
    • (2010) Commun ACM , vol.57 , Issue.3 , pp. 99-106
    • Enck, W.1    Gilbert, P.2    Chun, B.G.3    Cox, L.P.4    Jung, J.5    McDaniel, P.6
  • 16
    • 78149343900 scopus 로고    scopus 로고
    • The okl4 microvisor: convergence point of microkernels and hypervisors
    • in: ACM SIGCOMM Asia-Pacific Workshop on Systems, Apsys 2010, New Delhi, India, pp. 19–24, August
    • Heiser, G., Leslie, B., The okl4 microvisor: convergence point of microkernels and hypervisors. in: ACM SIGCOMM Asia-Pacific Workshop on Systems, Apsys 2010, New Delhi, India, pp. 19–24, August, 2010.
    • (2010)
    • Heiser, G.1    Leslie, B.2
  • 17
    • 84875683130 scopus 로고    scopus 로고
    • Inktag: Secure applications on an untrusted operating system
    • in: Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 253–264. doi:10.1145/2451116.2451146; Available from
    • Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E., Inktag: Secure applications on an untrusted operating system. in: Proceedings of the 18th International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 253–264. doi:10.1145/2451116.2451146; Available from http://doi.acm.org/10.1145/2451116.2451146, 2013.
    • (2013)
    • Hofmann, O.S.1    Kim, S.2    Dunn, A.M.3    Lee, M.Z.4    Witchel, E.5
  • 18
    • 80755187778 scopus 로고    scopus 로고
    • “These aren't the droids you're looking for”: Retrofitting android to protect data from imperious applications
    • in: ACM Conference on Computer and Communications Security
    • Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D., “These aren't the droids you're looking for”: Retrofitting android to protect data from imperious applications. in: ACM Conference on Computer and Communications Security, pp. 639–652, 2011.
    • (2011) , pp. 639-652
    • Hornyack, P.1    Han, S.2    Jung, J.3    Schechter, S.4    Wetherall, D.5
  • 19
    • 84967057581 scopus 로고    scopus 로고
    • Transparent page-based kernel and user space execution tracing from a custom minimal arm hypervsior
    • in: The IEEE International Conference on Trust, Security and Privacy in Computing and Communications
    • Horsch, J., Wessel, S., Transparent page-based kernel and user space execution tracing from a custom minimal arm hypervsior. in: The IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 408–417, 2015.
    • (2015) , pp. 408-417
    • Horsch, J.1    Wessel, S.2
  • 20
    • 51949098506 scopus 로고    scopus 로고
    • Xen on ARM: System virtualization using xen hypervisor for ARM-Based secure mobile phones
    • in: Proceedings of the 5th IEEE Consumer Communications and Networking Conference, pp. 257–261. doi:10.1109/ccnc08.2007.64
    • Hwang, J.-Y., bum Suh, S., Heo, S.-K., Park, C.-J., Ryu, J.-M., Park, S.-Y., et al. Xen on ARM: System virtualization using xen hypervisor for ARM-Based secure mobile phones. in: Proceedings of the 5th IEEE Consumer Communications and Networking Conference, pp. 257–261. doi:10.1109/ccnc08.2007.64, 2008.
    • (2008)
    • Hwang, J.-Y.1    bum Suh, S.2    Heo, S.-K.3    Park, C.-J.4    Ryu, J.-M.5    Park, S.-Y.6
  • 21
    • 51949117926 scopus 로고    scopus 로고
    • A multi-layer mandatory access control mechanism for mobile devices based on virtualization
    • in: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE
    • Lee, S.M., Suh, S.B., Jeong, B., Mo, S., A multi-layer mandatory access control mechanism for mobile devices based on virtualization. in: Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE, pp. 251–256, 2008.
    • (2008) , pp. 251-256
    • Lee, S.M.1    Suh, S.B.2    Jeong, B.3    Mo, S.4
  • 22
    • 84919340836 scopus 로고    scopus 로고
    • Multi-tiered security architecture for arm via the virtualization and security extensions
    • in: International Workshop on Database and Expert Systems Applications
    • Lengyel, T.K., Kittel, T., Pfoh, J., Eckert, C., Multi-tiered security architecture for arm via the virtualization and security extensions. in: International Workshop on Database and Expert Systems Applications, pp. 308–312, 2014.
    • (2014) , pp. 308-312
    • Lengyel, T.K.1    Kittel, T.2    Pfoh, J.3    Eckert, C.4
  • 23
    • 85030774887 scopus 로고    scopus 로고
    • Multi-platform extension of lightweight virtual machines
    • [Master's thesis]; Huazhong University of Science and Technology
    • Li, D., Multi-platform extension of lightweight virtual machines. [Master's thesis]; Huazhong University of Science and Technology, 2011.
    • (2011)
    • Li, D.1
  • 24
    • 84984907980 scopus 로고    scopus 로고
    • Virtualswindle: an automated attack against in-app billing on android
    • pp. 459–470
    • Mulliner, C., Robertson, W., Kirda, E., Virtualswindle: an automated attack against in-app billing on android. pp. 459–470, 2014.
    • (2014)
    • Mulliner, C.1    Robertson, W.2    Kirda, E.3
  • 25
    • 84958594618 scopus 로고    scopus 로고
    • XNPro: low-impact hypervisor-based execution prevention on ARM
    • in: International Workshop on Trustworthy Embedded Devices
    • Nordholz, J., Vetter, J., Peter, M., Junkerpetschick, M., Danisevskis, J., XNPro: low-impact hypervisor-based execution prevention on ARM. in: International Workshop on Trustworthy Embedded Devices, pp. 55–64, 2015.
    • (2015) , pp. 55-64
    • Nordholz, J.1    Vetter, J.2    Peter, M.3    Junkerpetschick, M.4    Danisevskis, J.5
  • 26
    • 84903960663 scopus 로고    scopus 로고
    • Vimo (virtualization for mobile): A virtual machine monitor supporting full virtualization for arm mobile systems
    • 48–53
    • Oh, S.C., Vimo (virtualization for mobile): A virtual machine monitor supporting full virtualization for arm mobile systems. 48–53, 2010.
    • (2010)
    • Oh, S.C.1
  • 27
    • 84863667079 scopus 로고    scopus 로고
    • Energy- and cost-efficiency analysis of ARM-based clusters
    • in: The IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing
    • Ou, Z., Pang, B., Deng, Y., Nurminen, J.K., Hui, P., Energy- and cost-efficiency analysis of ARM-based clusters. in: The IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, pp. 115–123, 2012.
    • (2012) , pp. 115-123
    • Ou, Z.1    Pang, B.2    Deng, Y.3    Nurminen, J.K.4    Hui, P.5
  • 28
    • 85030780344 scopus 로고    scopus 로고
    • T-KVM: A Trusted architecture for KVM ARM v7 and v8 Virtual Machines Securing Virtual Machines by means of KVM, TrustZone, TEE and SELinux
    • in: CLOUD COMPUTING 2015: The Sixth International Conference on Cloud Computing, GRIDs and Virtualization
    • Paolino, M., Rigo, A., Spyridakis, A., Fanguède, J., Lalov, P., Raho, D., T-KVM: A Trusted architecture for KVM ARM v7 and v8 Virtual Machines Securing Virtual Machines by means of KVM, TrustZone, TEE and SELinux. in: CLOUD COMPUTING 2015: The Sixth International Conference on Cloud Computing, GRIDs and Virtualization, 2015.
    • (2015)
    • Paolino, M.1    Rigo, A.2    Spyridakis, A.3    Fanguède, J.4    Lalov, P.5    Raho, D.6
  • 29
    • 85030785439 scopus 로고    scopus 로고
    • Real-time operating system virtualization for xen-arm
    • Park, M., Yoo, S.H., Yoo, C., Real-time operating system virtualization for xen-arm. 2008.
    • (2008)
    • Park, M.1    Yoo, S.H.2    Yoo, C.3
  • 30
    • 84875983680 scopus 로고    scopus 로고
    • CaffeineMark 3.0
    • Available from Accessed 20 October 2015
    • Pendragon Software Corporation, CaffeineMark 3.0. Available from http://www.benchmarkhq.ru/cm30/, 1997 Accessed 20 October 2015.
    • (1997)
    • Pendragon Software Corporation1
  • 31
    • 81455138600 scopus 로고    scopus 로고
    • Java SciMark 2.0
    • Available from Accessed 18 March 2017
    • Pozo, R., Miller, B., Java SciMark 2.0. Available from http://math.nist.gov/scimark2, 2004 Accessed 18 March 2017.
    • (2004)
    • Pozo, R.1    Miller, B.2
  • 32
    • 85021711566 scopus 로고    scopus 로고
    • Android binder security note: On passing binder through another binder
    • Rosa, T., Android binder security note: On passing binder through another binder. 2011.
    • (2011)
    • Rosa, T.1
  • 33
    • 84916598375 scopus 로고    scopus 로고
    • EmbeddedXEN: A revisited architecture of the xen hypervisor to support ARM-based embedded virtualization
    • White paper, Switzerland
    • Rossier, D., EmbeddedXEN: A revisited architecture of the xen hypervisor to support ARM-based embedded virtualization. White paper, Switzerland, 2012.
    • (2012)
    • Rossier, D.1
  • 34
    • 85021750303 scopus 로고    scopus 로고
    • H-Binder: a hardened binder framework on android systems
    • in: 12th EAI International Conference on Security and Privacy in Communication Networks
    • Shen, D., Zhang, Z., Li, Z., Ding, X., Deng, R., H-Binder: a hardened binder framework on android systems. in: 12th EAI International Conference on Security and Privacy in Communication Networks, pp. 24–43, 2016.
    • (2016) , pp. 24-43
    • Shen, D.1    Zhang, Z.2    Li, Z.3    Ding, X.4    Deng, R.5
  • 35
    • 0003486463 scopus 로고    scopus 로고
    • Designing the user interface: strategies for effective human-computer interaction
    • 3rd ed Addison-Wesley
    • Shneiderman, B., Designing the user interface: strategies for effective human-computer interaction. 3rd ed, 1998, Addison-Wesley.
    • (1998)
    • Shneiderman, B.1
  • 36
    • 0002254859 scopus 로고
    • Binary translation
    • Sites, R.L., Binary translation. Commun ACM 36:2 (1993), 69–81.
    • (1993) Commun ACM , vol.36 , Issue.2 , pp. 69-81
    • Sites, R.L.1
  • 37
    • 44649165755 scopus 로고    scopus 로고
    • ARM and Intel battle over the mobile chip's future
    • Smith, B., ARM and Intel battle over the mobile chip's future. Computer 41:5 (2008), 15–18.
    • (2008) Computer , vol.41 , Issue.5 , pp. 15-18
    • Smith, B.1
  • 38
    • 84874562066 scopus 로고    scopus 로고
    • Exploring an open wifi detection vulnerability as a malware attack vector on ios devices
    • in: International Conference on Malicious and Unwanted Software
    • Spaulding, J., Krauss, A., Srinivasan, A., Exploring an open wifi detection vulnerability as a malware attack vector on ios devices. in: International Conference on Malicious and Unwanted Software, pp. 87–93, 2012.
    • (2012) , pp. 87-93
    • Spaulding, J.1    Krauss, A.2    Srinivasan, A.3
  • 39
    • 84855558771 scopus 로고    scopus 로고
    • Implementing a simple trap and emulate vmm for the arm architecture
    • in: IEEE International Conference on Embedded and Real-Time Computing Systems and Applications
    • Suzuki, A., Oikawa, S., Implementing a simple trap and emulate vmm for the arm architecture. in: IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, pp. 371–379, 2011.
    • (2011) , pp. 371-379
    • Suzuki, A.1    Oikawa, S.2
  • 41
    • 80051566140 scopus 로고    scopus 로고
    • Implementing hardware-supported virtualization in okl4 on arm
    • [Ph.D. thesis]; The University of New South Wales
    • Varanasi, P., Implementing hardware-supported virtualization in okl4 on arm. [Ph.D. thesis]; The University of New South Wales, 2010.
    • (2010)
    • Varanasi, P.1
  • 43
    • 85030757373 scopus 로고    scopus 로고
    • Supported Xen Project 4.4 series
    • Available from Accessed 7 May 2014
    • XenProject, Supported Xen Project 4.4 series. Available from http://www.xenproject.org/downloads/xen-archives/xen-44-series.html, 2013 Accessed 7 May 2014.
    • (2013)
    • XenProject1
  • 44
    • 85030767939 scopus 로고    scopus 로고
    • A lightweight monitor for android kernel protection
    • Computer Engineering
    • Yang, Y., Qian, Z., Huang, H., A lightweight monitor for android kernel protection. Computer Engineering, 2014.
    • (2014)
    • Yang, Y.1    Qian, Z.2    Huang, H.3
  • 45
    • 84855824009 scopus 로고    scopus 로고
    • Android platform based linux kernel rootkit
    • in: International Conference on Malicious & Unwanted Software
    • You, D.H., Noh, B.N., Android platform based linux kernel rootkit. in: International Conference on Malicious & Unwanted Software, 2011, 79–87.
    • (2011) , pp. 79-87
    • You, D.H.1    Noh, B.N.2
  • 46
    • 85030790981 scopus 로고    scopus 로고
    • Study of linux kernel virtual machine technology implemented on arm platform
    • [Master's thesis]; Huazhong University of Science and Technology
    • Zhao, Y., Study of linux kernel virtual machine technology implemented on arm platform. [Master's thesis]; Huazhong University of Science and Technology, 2011.
    • (2011)
    • Zhao, Y.1
  • 47
    • 85030785686 scopus 로고    scopus 로고
    • Study of embedded system security assurance based on virtualization technology
    • [Master's thesis]; Nankai University
    • Zhong, M., Study of embedded system security assurance based on virtualization technology. [Master's thesis]; Nankai University, 2013.
    • (2013)
    • Zhong, M.1
  • 48
    • 84878350874 scopus 로고    scopus 로고
    • Building verifiable trusted path on commodity x86 computers
    • in: Proceedings of the 33rd IEEE Symposium on Security and Privacy
    • Zhou, Z., Gligor, V.D., Newsome, J., McCune, J.M., Building verifiable trusted path on commodity x86 computers. in: Proceedings of the 33rd IEEE Symposium on Security and Privacy, pp. 616–630, 2012.
    • (2012) , pp. 616-630
    • Zhou, Z.1    Gligor, V.D.2    Newsome, J.3    McCune, J.M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.