Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices

Michael Hölzl, Rene Mayrhofer, Michael Roland

Research output: Chapter in Book/Report/Conference proceedingsConference contributionpeer-review

9 Citations (Scopus)

Abstract

Insufficient security and privacy on mobile devices have made it difficult to utilize sensitive systems like mobile banking, mobile credit cards, mobile ticketing or mobile passports. Solving these challenges in security and privacy, could result in better mobility and a higher level of confidence for the end-user services in such systems. Our approach for a higher security and privacy level on mobile devices introduces an open ecosystem for tamper resistant hardware. Big advantages of these modules are the protection against unauthorized access and the on-device cryptographic operations they can perform. In this paper, we analyse the requirements and performance restrictions of these hardware modules and present an interface concept for a tight integration of their security features.
Original languageEnglish
Title of host publicationProceedings - 11th International Conference on Advances in Mobile Computing and Multimedia, MoMM 2013
PublisherACM Press
Pages249-252
Number of pages4
ISBN (Print)978-1-4503-2106-8
DOIs
Publication statusPublished - 2013
Event11th International Conference on Advances in Mobile Computing and Multimedia (MoMM2013) - Vienna, Austria
Duration: 2 Dec 20134 Dec 2013
http://www.iiwas.org/conferences/momm2013/

Publication series

NameACM International Conference Proceeding Series

Conference

Conference11th International Conference on Advances in Mobile Computing and Multimedia (MoMM2013)
Country/TerritoryAustria
CityVienna
Period02.12.201304.12.2013
Internet address

Keywords

  • Tamper resistant hardware
  • trusted execution environment
  • transparent secure channel
  • open ecosystem
  • secure element

Fingerprint

Dive into the research topics of 'Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices'. Together they form a unique fingerprint.

Cite this