In the last decades mobile devices have evolved to hand-held computers. Their hardware- (processing power, communication interfaces, available memory, etc.) and software- (mobile operating system, third party applications, etc.) capabilities enable functionality far beyond simple phone calls and text messaging. The disadvantage of more complex software is that mobile devices become more vulnerable to attacks. The increasing number of ``smart'' devices on the market makes them an attractive target for attackers. We address this problem by proposing security zones on mobile devices separated on file, user or operating system level. These zones are used to provide the possibility to implement security critical applications with a strong focus on usability.
|Title of host publication||Adjunct Proceedings the 2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013)|
|Publication status||Published - 2013|
|Event||2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013) - Zürich, Switzerland|
Duration: 8 Sep 2013 → 12 Sep 2013
|Conference||2013 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp 2013)|
|Period||08.09.2013 → 12.09.2013|