• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Emulating Trust zone feature in Android emulator by extending QEMU

Muthu, Arun January 2013 (has links)
The arrival of smart phones has created the new era in communication between users and internet. Smart phone users are able to run their own application along with enterprise applications. In case of personal application, most of them are downloaded from public market, resulting in challenge for the security frame work by threat of losing sensitive user data. So, ARM introduces the virtualization technique in hardware level to prevent the application process completely isolated from the normal world. However, understanding ARM architecture and internal working is still black box for the user as well as developers. So, in this thesis, by using the qualitative approach like examine the pre research work in open source and ARM trust zone, white paper, internal knowledge from Sony security team, we take a deep look at the architecture of the ARM trust zone in hardware level to analyze and evaluate their implementation. We describe the design and implementation of trust zone features in android emulator with advantages and disadvantages of it in analysis and result phase and conclude with annotation of suitable design on future use to enhance the security domain for secure processing and utility in Android emulator to benefit the user and developer community. The contribution of this thesis project can be summarized as following: 1) reviewing current practices and theories on implementation of ARM Trust zone; 2) creating a common methodology for handle the research problem; 3) proposing step-by-step approaches by comparing actual working of Trust zone in hardware level with design and idea of emulated one; 4) Analysis and design the appropriate model to solve the research question.

Page generated in 0.096 seconds