DroidVault: A trusted data vault for android devices

Xiaolei Li, Hong Hu, Guangdong Bai, Yaoqi Jia, Zhenkai Liang, Prateek Saxena

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Scopus citations

Abstract

Mobile OSes and applications form a large, complex and vulnerability-prone software stack. In such an environment, security techniques to strongly protect sensitive data in mobile devices are important and challenging. To address such challenges, we introduce the concept of the trusted data vault, a small trusted engine that securely manages the storage and usage of sensitive data in an untrusted mobile device. In this paper, we design and build Droid Vault-the first realization of a trusted data vault on the Android platform. Droid Vault establishes a secure channel between data owners and data users while allowing data owners to enforce strong control over the sensitive data with a minimal trusted computing base (TCB). We prototype Droid Vault via the novel use of hardware security features of ARM processors, i.e., Trust Zone. Our evaluation demonstrates its functionality for processing sensitive data and its practicality for adoption in the real world.

Original languageEnglish (US)
Title of host publicationProceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages29-38
Number of pages10
ISBN (Electronic)9781479954827
DOIs
StatePublished - Oct 13 2014
Event2014 19th International Conference on Engineering of Complex Computer Systems, ICECCS 2014 - Tianjin, China
Duration: Aug 4 2014Aug 7 2014

Publication series

NameProceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS

Conference

Conference2014 19th International Conference on Engineering of Complex Computer Systems, ICECCS 2014
CountryChina
CityTianjin
Period8/4/148/7/14

All Science Journal Classification (ASJC) codes

  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'DroidVault: A trusted data vault for android devices'. Together they form a unique fingerprint.

Cite this