TY - GEN
T1 - A hardware-assisted protection and restoration scheme of lost smart phones
AU - Younkim, Ki
AU - Seo, Euiseong
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2015/2/5
Y1 - 2015/2/5
N2 - Since smart phones are expensive and carrying sensitive personal information including e-mail messages, memos, photos and so on, mobile phone manufacturers are providing services that can protect personal information and help restoration of lost or stolen smart phones. Currently, most of the protection and restoration schemes, which are being used in the commodity smart phones, are software-based. However, such software-based schemes are not effective as they can be easily incapacitated through device initialization, network disconnection, system software modification and so on. This paper categorizes the incapacitation threat methods of the protection and restoration schemes into four, and analyzes how the current software-based schemes cannot function correctly in each threat model. In order to counter these four exploitation models, this paper also proposes a hardware-assisted solution. The proposed scheme is built upon on an additional internal SIM (Subscriber Identifier Module) card and small capacity sub-battery. Finally, this paper assesses the effectiveness of the proposed scheme against the four cases.
AB - Since smart phones are expensive and carrying sensitive personal information including e-mail messages, memos, photos and so on, mobile phone manufacturers are providing services that can protect personal information and help restoration of lost or stolen smart phones. Currently, most of the protection and restoration schemes, which are being used in the commodity smart phones, are software-based. However, such software-based schemes are not effective as they can be easily incapacitated through device initialization, network disconnection, system software modification and so on. This paper categorizes the incapacitation threat methods of the protection and restoration schemes into four, and analyzes how the current software-based schemes cannot function correctly in each threat model. In order to counter these four exploitation models, this paper also proposes a hardware-assisted solution. The proposed scheme is built upon on an additional internal SIM (Subscriber Identifier Module) card and small capacity sub-battery. Finally, this paper assesses the effectiveness of the proposed scheme against the four cases.
KW - information protection
KW - privacy
KW - security
KW - SIM
KW - smart phones
KW - wireless network
UR - https://www.scopus.com/pages/publications/84937837717
U2 - 10.1109/ICCE-Berlin.2014.7034213
DO - 10.1109/ICCE-Berlin.2014.7034213
M3 - Conference contribution
AN - SCOPUS:84937837717
T3 - IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin
SP - 122
EP - 125
BT - Proceedings 2014 IEEE 4th International Conference on Consumer Electronics - Berlin, ICCE-Berlin
A2 - Bellido, Francisco J.
A2 - Hepper, Dietmar
A2 - Cycon, Hans L.
A2 - Huhn, Alexander
PB - IEEE Computer Society
T2 - 2014 4th IEEE International Conference on Consumer Electronics - Berlin, ICCE-Berlin
Y2 - 7 September 2014 through 10 September 2014
ER -