Software Components for Secure Mobile Web Application Platforms - - PowerPoint PPT Presentation

software components for secure mobile web application
SMART_READER_LITE
LIVE PREVIEW

Software Components for Secure Mobile Web Application Platforms - - PowerPoint PPT Presentation

Software Components for Secure Mobile Web Application Platforms Patrik Persson & Bjrn Johansson Ericsson Research Mobile Platforms, Lund, Sweden About us Ericsson Research in Lund, Sweden Device security, application


slide-1
SLIDE 1

Software Components for Secure Mobile Web Application Platforms

Patrik Persson & Björn Johansson Ericsson Research Mobile Platforms, Lund, Sweden

slide-2
SLIDE 2

W3C workshop, London 2008-12-11 2

About us

  • Ericsson Research in Lund, Sweden

– Device security, application environments, ... – Working tightly with Ericsson Mobile Platforms (EMP)

  • EMBRACE:

Ericsson Mobile Browser Research And Cool Extensions

– Prototype Widget-based terminal – EMP 3G platform, Linux kernel, Webkit, W3C- style Widgets

slide-3
SLIDE 3

W3C workshop, London 2008-12-11 3

Motivation: Separation of concerns

  • Need separation of

– Platform – Browser engine – Device APIs – Access control

  • Need a vendor-neutral access control mechanism

– Assuming policy defined by operator, manufacturer, community, or other

  • Software component technology
slide-4
SLIDE 4

W3C workshop, London 2008-12-11 4

Why software components?

  • Software component models

– Separation of platform and application (separate address spaces possible) – Single entry point  centralized access control (method interception) – Can be fairly light-weight (e.g., COM/ECM)

  • Interfaces described in IDL (interface description

language)

– Translated to glue code in JavaScript, C/C++, Java, ... – Language independence (with limitations)

slide-5
SLIDE 5

W3C workshop, London 2008-12-11 5

COM/IDL translation example

Interface Description Language (IDL)

interface ICall { int start(char * nbr); void stop(int session); void answer(int session); void reject(int session); }

Generated proxy (JavaScript)

function ICall(...) { function start(nbr) { ... }; function stop(session) { ... }; function answer(session) { ... }; function reject(session) { ... }; }

  • Automatic IDL-to-JavaScript translator

– COM interface instances  JavaScript proxy components – COM callback interfaces  JavaScript event handlers

  • Some IDL limitations apply (e.g., regarding void*)
slide-6
SLIDE 6

W3C workshop, London 2008-12-11 6

Basic architecture

Platform Layer Access Control Layer Context Layer Shim Layer Application Layer

Implements (de-facto) standard APIs in terms of platform primitives JavaScript apps Maintains identity of currently executing application Access decision: Map interface  required access API functionality Javascript (possibly untrusted) Trusted platform domain

slide-7
SLIDE 7

W3C workshop, London 2008-12-11 7

Conclusions

  • Advantages

– Separation of concerns – Language independence (C/C++, Java, JavaScript, Python, Ruby, ...) – Single entry point  centralized access control – ECM (COM-like) proven in mobile devices

  • Challenges

– Maintaining run-time identity – Dynamically downloadable shim layers? – Performance & footprint – User experience

slide-8
SLIDE 8

W3C workshop, London 2008-12-11 8