Skip to main navigation Skip to search Skip to main content

Security analysis of Samsung Knox

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A Trusted Execution Environment (TEE) has become popular in the mobile industry. Hardware-based security will be employed by default for every mobile device within a few years. In this paper, we explore several potential security issues of the Samsung Knox platform that is one of the advanced hardware based mobile security platforms for Android devices. We describe several attack scenarios to show how the Knox platform can be compromised. We particularly performed experiments for Man in the Middle Attacks with an untrusted certificate. To mitigate such security risks, we also recommend several countermeasures based on fundamental security principles. For example, security-sensitive resources in Knox should be strictly isolated from processes in an insecure operating system.

Original languageEnglish
Title of host publication19th International Conference on Advanced Communications Technology
Subtitle of host publicationOpening Era of Smart Society, ICACT 2017 - Proceeding
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages550-553
Number of pages4
ISBN (Electronic)9788996865094
DOIs
StatePublished - 29 Mar 2017
Event19th International Conference on Advanced Communications Technology, ICACT 2017 - Pyeongchang, Korea, Republic of
Duration: 19 Feb 201722 Feb 2017

Publication series

NameInternational Conference on Advanced Communication Technology, ICACT
ISSN (Print)1738-9445

Conference

Conference19th International Conference on Advanced Communications Technology, ICACT 2017
Country/TerritoryKorea, Republic of
CityPyeongchang
Period19/02/1722/02/17

Keywords

  • Samsung knox
  • Trusted computing
  • TrustZone

Fingerprint

Dive into the research topics of 'Security analysis of Samsung Knox'. Together they form a unique fingerprint.

Cite this