Skip to main content
Log in

Resiliency of mobile OS security for secure personal ubiquitous computing

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

As computing devices such as smartphone are used widely, people conduct their businesses using devices and even enjoy entertainment anywhere. On the other side, worries about privacy or economic damages by cyber attacks are increasing. Although many cyber threats may happen, it is difficult to detect and defend against them before attacks occur, and also it isn’t easy to cope with certain attack by one matching defense technique. One approach to solve these problems is to enhance the security of OS (operating systems). We developed a kernel-level mobile OS security technique, called by DMOS (Deep Mobile OS Security), for secure personal ubiquitous computing. It has deep security ability that blocks attacks layer by layer in a defense-in-depth manner so that important content is protected and essential services can be continued even though attacks intrude into the devices. In order to assess how well DMOS can realize such defense abilities, this paper tries to analyze the resiliency capability of DMOS. Referring to the cyber resiliency framework, we analyze the techniques and the defense effects related to resiliency which DMOS can support along cyber attack cycle. Also, we test the resilient defense ability of DMOS under typical cyber attacks scenarios. From analysis and test results, it can be concluded that DMOS has the resiliency capability to realize deep security for personal ubiquitous computing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. T. Guo, P. Zhang, H. Liang, S. Shao (2013) Enforcing multiple security policies for android system, In: Proc. of the 2nd International Symposium on Computer, Communication, Control and Automation, pp. 165–169

  2. Draft version 1.1 (2017) Framework for improving critical infrastructure cybersecurity, National Institute of Standards and Technology, pp. 1–57, Jan.

  3. Mobile security R&D program guide, Homeland Security, vol. 1, pp. 1–48

  4. D.J. Bodeau, R.D. Graubart, E.R. Laberman (2014) Cyber resiliency engineering overview of the architectural assessment process, In: Proc. of Conference on Systems Engineering Research (CSER2014), pp. 838–847

  5. ADD (2016) Development specifications for mobile OS security, http://www.add.re.kr

  6. Lee S, Kang T (2015) Adaptive multi-layer security approach for cyber defense. J Internet Comput Serv (JICS) 16(5):1–9

    Article  Google Scholar 

  7. C. Williams, T. Watson et al (2012) Resilient cyber ecosystems, Crosstalk Journal of Defense Software Engineering, vol.25, no.5, US Air Force, Sep./Oct

  8. G. Jakobson (2013) Mission-Centricity in cyber security: architecting cyber attack resilient missions, In: Proc. of the 5th International Conference on Cyber Conflict, pp. 1–18

  9. Goldman HG (2010) Building secure, resilient architectures for cyber mission assurance. MITRE Technical Report, pp.:1–18

  10. J.B. Rice Jr, F. Caniato (2003) Building a secure and resilient supply network, Supply Chain Management Review, Sep/Oct. pp. 22–30

  11. J. Snyder (2006) Six strategies for defense-in-depth, OPUS, pp. 1–9

  12. K. Cox, D. Bodeau, R. Graubart (2015) The cyber resiliency framework: planning for cyber attack survival, MITRE presentation pp. 1–55

  13. S. Wagner, E. van den Berg, J. Giacopelli, P. Manghwani (2012) Autonomous, collaborative control for resilient cyber defense (ACCORD), In: Proc. of IEEE 6th International conference on Self-Adaptive and Self-organizing Systems Workshops, pp. 39–46

  14. Florio VD (2014) Antifragility = elasticity + resilience + machine learning models and algorithms for open system fidelity. Proc Comput Sci 32:834–841

    Article  Google Scholar 

  15. D. Bodeau, R. Graubart, J. Picciotto, R. McQuaid (2011) Cyber resiliency engineering framework, MITRE Technical Report 1–68

  16. D. Bodeau, R. Graubart, W. Heinbockel, E. Laderman (2015) Cyber resiliency engineering aid-the updated cyber resiliency engineering framework and guidance on applying cyber resiliency techniques, MITRE, 1–63

  17. Velazquez C (2015) Detecting and preventing attacks earlier in the kill chain. SANS Institute Infosec Reading Room, pp.:1–21

  18. D. Bodeau, R. Graubart, L. LaPadula, P. Kertzner, A. Rosenthal, J. Brennan (2012) Cyber resiliency metrics, version 1.0, rev. 1, MITRE Technical Report, pp. 1–34

  19. P. Faruki, A. Bharmal, V. Laxmi, V. Ganmoor, M.S. Gaur, M. Conti, M. Rajarajan (2015) Android security: a survey of issues, malware penetration and defense, IEEE Communications Surveys and Tutorials 1–27

  20. Sanghvi HP, Dahiya MS (2013) Cyber reconnaissance: an alarm before cyber attack. Int J Comput Appl 63(6):36–38

    Google Scholar 

  21. B. Schmerl, J. Camara, J. Gennari, D. Garlan, P.Casanova, G.A. Moreno, T.J. Glazier, J.M. Barnes (2014) Architecture based self-protection: composing and reasoning about denial-of-service mitigations, In: Proc. of the 2014 Symposium and Bootcamp on the Science of Security, pp. 1–12

  22. E. Yuan, S. Malek (2012) A taxonomy and survey of self-protecting software systems, In: Proc. of the 7th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, pp. 109–118

  23. J. Newsome, D. Brumley, D. Song (2005) Sting: an end-to-end self-healing system for defending against zero-day worm attacks on commodity software, Carnegie Mellon University pp. 1–27

  24. P. Ramuhalli, M. Halappanavar, J. Coble, M. Dixit (2013) Towards a theory of autonomous reconstitution of compromised cyber-systems, In: Proc. of International Conference: Technologies for Homeland Security (HST), pp. 577–583

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seongkee Lee.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, S., Lee, S., Kang, T. et al. Resiliency of mobile OS security for secure personal ubiquitous computing. Pers Ubiquit Comput 22, 23–34 (2018). https://doi.org/10.1007/s00779-017-1098-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-017-1098-x

Keywords

Navigation