verifying security invariants in expressos
play

Verifying security invariants in ExpressOS Haohui Mai, Edgar Pek, - PowerPoint PPT Presentation

Verifying security invariants in ExpressOS Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, P . Madhusudan University of Illinois at Urbana-Champaign Mobiles devices are powerful Security of mobile devices is important High value


  1. Verifying security invariants in ExpressOS Haohui Mai, Edgar Pek, Hui Xue, Samuel T. King, P . Madhusudan University of Illinois at Urbana-Champaign

  2. Mobiles devices are powerful 

  3. Security of mobile devices is important • High value targets on mobile devices

  4. Security of mobile devices is important • High value targets on mobile devices                                              

  5. Security of mobile devices is important • High value targets on mobile devices                                              

  6. Security of mobile devices is important • High value targets on mobile devices                                              

  7. Security of mobile devices is important • High value targets on mobile devices                                               ?

  8. Motivating example                        

  9. Motivating example                        

  10. Motivating example • Isolate the application’s                         persistent storage from • other applications • components of the File system system Device driver Kernel

  11. Motivating example • Isolate the application’s                         persistent storage from • other applications • components of the File system system Device driver • Immediately meaningful Kernel

  12. ROOTED

  13. Wide attack surfaces                                                     File system         Device driver            Kernel                 

  14. Wide attack surfaces                                                     File system         Device driver            Kernel                 

  15. Wide attack surfaces                                                     File system         Device driver            Kernel                 

  16. Wide attack surfaces                                                     File system         Device driver            Kernel                 

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend