期刊文献+

基于可信硬件的智能手机短信加密方案 被引量:5

SMS Encryption Scheme for Smartphones Based on Trusted Hardware
下载PDF
导出
摘要 手机短信已成为手机应用中双因子验证的常用方法,广泛用于网站登录、移动支付、银行转账等关键应用中。许多恶意软件利用手机系统漏洞来窃听短信和截取用户的验证码,从而对用户的财产安全造成了巨大的威胁。为防御这类恶意软件,许多基于对称密钥、公私钥体制等加密算法的手机短信加密软件已经被开始使用,给用户带来了较大便利。然而此类解决方案并不能保证在智能手机操作系统被攻破时短信明文数据与密钥数据的安全性。本文提出的Trust SMS系统通过利用ARM Trust Zone技术,可以同时保证短信数据在传输过程中与在智能手机操作系统内的安全性。本文在三星Exynos 4412开发板上实现了Trust SMS的原型系统,实验数据表明Trust SMS系统对智能手机操作系统产生的影响极小,性能开销则低于1%。 SMS has become a common used method in two-factor authentication,which is widely used for website login,mobile payment,bank transfer and other critical applications. However,many malicious applications take use of mobile operating system vulnerabilities to eavesdrop and intercept SMS for users' authentication code,which brings a great threat on the security of the user's property. To defend such malicious applications,many SMS encryption applications based on symmetric key encryption algorithm or public / private key system have been started using,which bring great convenience to the users. However,such solutions cannot guarantee the confidentiality of the SMS plaintext or even the seeds when the mobile OS is compromised. This paper presents Trust SMS( Trusted Short Message Service),a secure SMS encryption scheme by using ARM Trust Zone technology. Trust SMS can not only protect the confidentiality of the SMS against a malicious mobile OS,but also guarantee reliable end-to-end SMS transmission. A prototype of Trust SMS is developed on Samsung Exynos 4412. The experimental results show that Trust SMS has small impacts on the mobile OS and its performance overhead is less than 1%.
作者 马明阳
出处 《计算机与现代化》 2016年第4期29-35,共7页 Computer and Modernization
基金 国家自然科学基金资助项目(61303011) 上海张江国家自主创新示范区专项发展资金重点项目(201501-YPB108-012)
关键词 短信加密 ARM TrustZone技术 NTRU公钥密码体制 移动安全 SMS encryption ARM TrustZone technology NTRU public-key cryptosystem mobile security
  • 相关文献

参考文献17

  • 1Amani N. Using SMS as a business communication tools forSMES[ C]// The 6th Regional Innovation System and In-novation Clusters, 2009.
  • 2Symantec. Whitepaper: Two-factor Authentication: A TCOViewpoint[ EB/OL]. https://www4. Symantec, com/mkt-ginfo/whitepaper/user _ authentication/whitepaper-twofac-tor-authentication. pdf, 2015-12-15.
  • 3Babu K S,Saleems A F. SMS encryption for mobile commu-nication [J ]. International Journal of Scientific Engineeringand Technology Research, 2013,2(17) : 1965-1972.
  • 4Mueller R, Schrittwieser S, Fruehwirt P, et al. Securityand privacy of smartphone messaging applications[ J]. In-ternational Journal of Pervasive Computing and Communi-cations, 2015,11(2) :132-150.
  • 5Rayarikar R,Upadhyay S,Pimpale P. SMS encryption u-sing AES algorithm on Android [ J ]. International Journalof Computer Applications, 2012,50( 19) : 12-17.
  • 6Agoyi M, Serai D. SMS security: An asymmetric encryptionapproach[ C]// 2010 6th International Conference on Wire-less and Mobile Communications (ICWMC). 2010 :448-452.
  • 7Qi Na, Pan Jing, Ding Quan. The implementation of FP-GA-based RSA public-key algorithm and its application inmobile-phone SMS encryption system[ C]// 2011 1st Inter-national Conference on Instrumentation,Measurement,Computer, Communication and Control. 2011 :700-703.
  • 8Abdel-latef B A, Ahmed A A, Mahfouz A, et al. Hybridcompression encryption technique for securing SMS [ J ].International Journal of Computer Science and Security,2010,3(6) :473481.
  • 9Lin Chia-chi, Li Hongyang, Zhou Xiaoyong, et al. Screen-milker : How to milk your Android screen for secrets [ C ] //The 21st Annual Network and Distributed System SecuritySymposium ( NDSS) . 2014.
  • 10Arzt S, Rasthofer S, Bodden E. Instrumenting Android andJava applications as easy as abc[ C]// Runtime Verification(The 4th International Conference RV2013). 2013,8174;364-381.

同被引文献23

引证文献5

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部