Protecting Smart Phones by Means of Execution Replication

Smartphones have come to resemble PCs in software complexity, with complexity usually leading to bugs and vulnerabilities. Moreover, as smartphones are increasingly used for financial transactions and other privacy sensitive tasks, they are becoming attractive targets for attackers. Unfortunately, smartphones are quite different from PCs in terms of resource constraints imposed on the design of protection mechanisms, as battery power is an extremely scarce resource.

Provided by: Vrije Universiteit Topic: Mobility Date Added: Feb 2010 Format: PDF

Download Now

Find By Topic