Improving Mobile Device Security with Operating System-Level Virtualization
Open Access
- 1 January 2013
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Privilege Escalation Attacks on AndroidLecture Notes in Computer Science, 2011
- PorschaPublished by Association for Computing Machinery (ACM) ,2010
- A methodology for empirical analysis of permission-based security models and its application to androidPublished by Association for Computing Machinery (ACM) ,2010
- Securing Android-Powered Mobile Devices Using SELinuxIEEE Security & Privacy, 2009
- Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile PhonesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- A trusted mobile phone reference architecturevia secure kernelPublished by Association for Computing Machinery (ACM) ,2007
- The Nizza Secure-System ArchitecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Security Architecture for Device Encryption and VPNPublished by Springer Science and Business Media LLC ,2005